-
Notifications
You must be signed in to change notification settings - Fork 3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use PGP and avoid encryption key knowledge #5
Comments
Thanks for your suggestion. Receiver's public key is already encoded in a URI fragment in form of If we were to implement a design with the widgets, need for password would be removed since the receiver's private key is available (file system or cookie). That also makes the protocol safer since it becomes resistant to weak passwords. Do you think there are any security advantages if widgets are used? |
The essence of the service for the Receiver is to receive a file from the Sender and save it on his local file system. It seems logical to assume saving a private key file on the Receiver’s file system is a lower burden than generating and storing a (strong) password elsewhere. As a separate note it wasn’t clear to me from your project description that you employed a sophisticated encryption and key generation protocol already. It may or may not be a more secure solution overall compared to the simple keypair approach proposed in this ticket. So given you already have a strong encryption scheme the ultimate judgement criterion might be a marketing study of two user scenarios:
by the Receiver. |
For the web app, I prefer the password scenario. It's more intuitive and easier to use for non-technical users. I like the idea of storing the private keys locally for non-web APIs and will consider adding it as one of the options. |
Make a receiver user side key generation browser widget to generate a private/public keypair on his system. Allow receiver to send the public key as encoded in the link to the sender. Sender side widget encodes the file using that link/key locally on sender system.
The private key is stored in a write-only cookie or downloaded to the receiver system. The Blindsend Server thus never gets to see it. Decryption happens entirely on the receiver side using the information stored in the cookie.
The text was updated successfully, but these errors were encountered: