[messaging] Multiple devices and key synchronization: some thoughts

David Gil dgil at yahoo-inc.com
Sat Jan 3 15:31:30 PST 2015


Re Sam's proposal, essentially.

I thought it might be worthwhile to be more explicit about my models for device compromise:

Ephemeral compromise: The adversary can read the contents of some (possibly limited) set of memory locations, including the location where the key is stored.
(E.g., some browser security bugs, Heartbleed.)

Temporary compromise:
t=day 0. Adversary uses a vulnerability to establish persistent presence (formerly hard in-browser, but now possible via, e.g., ServiceWorkers...)
t=... malicious software uses other vulnerabilities to read keys
t=n days. The bug is fixed and platform-level protection mechanisms eliminate the malicious software.

Permanent compromise: The adversary replaces part of the platform's trusted computing base (be it hardware or software) with code it controls.

Keeping private keys unencrypted in memory for only a short period of time is an okay way to protect against ephemeral compromise. It does nothing to protect against temporary compromise.

(And nothing we do can protect against permanent compromise; for code running in a browser, that's the browser's responsibility.)

- dlg 


More information about the Messaging mailing list