zlacker

[parent] [thread] 9 comments
1. aith+(OP)[view] [source] 2020-05-31 22:10:45
It's a simple static site with no server involved. Everything happens client side. You could turn off your internet while you're using it if you wanted to make sure no data is exposed.
replies(4): >>dzhiur+Wd >>KingMa+7e >>vagab0+mh >>heavys+uo
2. dzhiur+Wd[view] [source] 2020-05-31 23:46:19
>>aith+(OP)
Would a service worker running in background be able to upload your sensitive data once you are back online?
3. KingMa+7e[view] [source] 2020-05-31 23:47:49
>>aith+(OP)
True, but it's only safe if you do that. You have to either inspect the code every time you use the site or run it locally. Until subresource integrity [1] becomes widely used & the capability to 'pin' a given script to a specific version, web applications can not be used without at least trusting the owner of the domain.

A better example is Protonmail, a secure email service. It has a nice web client and there is an 3rd party desktop/electron version of the same size called Electronmail. While both essentially run identical code, the electron version is more secure because even Protonmail insert a backdoor for a single or # of users. They would have to at least publish the backdoor in the vanilla code at which point, the maintainers of Electronmail will probably raise the alarm.

[1] https://developer.mozilla.org/en-US/docs/Web/Security/Subres...

replies(2): >>rkager+Kf >>t-writ+Yg
◧◩
4. rkager+Kf[view] [source] [discussion] 2020-06-01 00:00:44
>>KingMa+7e
Write a little piece of open-source client software to take a hash of the source code. Check the hash every time you use it. Spread the tool around to a community of people who review every time the hash changes and publish (separately) a history of attested hashes.
◧◩
5. t-writ+Yg[view] [source] [discussion] 2020-06-01 00:12:04
>>KingMa+7e
Or, you could download the repository, validate it once for yourself and then use it repeatedly. It is open source, after all.
6. vagab0+mh[view] [source] 2020-06-01 00:15:21
>>aith+(OP)
For linux users you can "turn off" internet for a single program: https://news.ycombinator.com/item?id=21146655
replies(1): >>rkeene+Ej
◧◩
7. rkeene+Ej[view] [source] [discussion] 2020-06-01 00:39:17
>>vagab0+mh
I actually wrote an even better way to do this, since my build system drops network access after downloading SHA-256 validated source (to ensure that source can't go out and fetch more things during build):

https://chiselapp.com/user/rkeene/repository/bash-drop-netwo...

8. heavys+uo[view] [source] 2020-06-01 01:36:58
>>aith+(OP)
A bad actor could selectively serve a different version to those they want to target.
replies(1): >>abathu+sr
◧◩
9. abathu+sr[view] [source] [discussion] 2020-06-01 02:20:44
>>heavys+uo
There's no way to obtain and execute source code that you didn't write and hand-compile for which this risk doesn't exist. (And it applies in its own sense to books, paintings, phone calls from mom, letters from an old mentor, DVDs, rental cars, ...)
replies(1): >>heavys+sF3
◧◩◪
10. heavys+sF3[view] [source] [discussion] 2020-06-02 04:14:18
>>abathu+sr
Download, verify keys and signatures. You could run a checksum or even read the code yourself depending on how paranoid you are. Otherwise, you're just hoping mycrimepics.net/dontsnitch wasn't subpoenaed between your last visit and now.
[go to top]