Skip to content

Improper security statements #2

@nmaier

Description

@nmaier

As I understand it, all that is required to obtain the "pseudo random, strong encryption key" is to authenticate with the FileRock servers via the password, retrieve a copy of the remotely stored and password-encrypted strong key, and decrypt it with (a derivation of) the password.

So the data security boils down to knowing the one password as the weakest link.
I see that there are several places where I'm supposed to enter said password on your website, e.g. the signup form and login form, therefore it is possible for FileRock and/or any attacker able to compromise your web frontend systems or MITM the traffic to obtain said password and access all the supposedly confidential data.
While the client software can be audited and it can be ensured that the plain text password is never transmitted, the website can not.

Hence, the statements that "you will be the only one able to view and modify your files." and "you don't have to trust anyone, not even FileRock itself!" are wrong and void.

One possible solutions would be implementing something like J-PAKE (see Firefox Sync).

Metadata

Metadata

Assignees

Labels

No labels
No labels

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions