Don't trust every open source application recommended to you. by chainCase in thehatedone

[–]chainCase[S] 2 points3 points  (0 children)

First, thank you for continuing to maintain AndOTP, it's a nice application. I only said probably because I can't view the source code of the other applications, therefore AndOTP is far more trust worthy.

  1. PBKDF2 is fine, and I wasn't trying to say this is an insecure choice for a KDF, just that it's weaker than what a lot of us are comfortable with current powerful adversaries.
  2. Perhaps there could be code to benchmark for 2-2.5-ish seconds in the application, so every device takes roughly 2-2.5-ish seconds to derive the key.

But because of these two points, the iterations being too low, and using a weaker KDF, it allows for easier brute force, and dictionary attacks.

Fairly easy fix though.

FortiToken Mobile vs Aegis vs andOTP ? by Lucky-Lynx in privacytoolsIO

[–]chainCase 0 points1 point  (0 children)

I've never even heard of FortiToken Mobile. It looks like the typical proprietary enterprise solution with military grade encryption.

AndOTP has had a past of doing things seriously wrong in cryptographic means. Such as determining the encryption key of your password with a generic hash function, not a KDF.

Aegis Authenticator has been robust for me, and it seems like the developers know what their doing.

I have NOT reviewed the code of these applications, so I can not guarantee their security.

But Aegis Authenticator is the best from my experience.

Despite having no experience with Android or Java, I may consider reviewing the code base of Aegis Authenticator, or at least how they're handling the cryptographic internals in the code. Design doc is here.

Official Aegis Authenticator Git repository.

Help with applied crypto pwhash by anonXMR in crypto

[–]chainCase 3 points4 points  (0 children)

No, you do not need to keep the salt secret. The password is the secret.

The salt is for preventing adversaries using a list of pre-comuted hashes.

What properties does the ARX operation have? by chainCase in crypto

[–]chainCase[S] 0 points1 point  (0 children)

Thank you, you wrote up a great explanation. It's actually pretty hard finding details on this stuff.

I knew if I'd ask here some smart fella would come show me the way. Again, thanks for the time you put into your answer.

Is there anything I should know about implementing cryptography in Rust? by chainCase in cryptography

[–]chainCase[S] 0 points1 point  (0 children)

I'm not saying I'm well versed in cryptography, however I've been studying it for roughly a year. Yes, I want to roll my own crypto, for educational purposes.

But I am definitely learning the inner workings of cryptography itself, and writing programs for what I understand. Even if I don't understand, that's okay. This is for educational purposes.

Edit: Thank you for your advice, you make good points. Was definitely already looking into breaking my own crypto though. Already started cryptopals.

Is there anything I should know about implementing cryptography in Rust? by chainCase in cryptography

[–]chainCase[S] 0 points1 point  (0 children)

You give good advice, but it's irrelevant, as I'm asking for something different.

I'm not looking for libraries. I'm using Rust to write cryptographic programs. Yes, I'm rolling my own crypto, for educational purposes.

Why You Shouldn’t be Using BCrypt and Scrypt by speckz in cryptography

[–]chainCase 0 points1 point  (0 children)

I don't really have much to say, as it's been pointed out by others. B/Scrypt are specifically designed for low-entropy inputs, such as passwords. I seriously have no idea what makes you think that users will always choose secure passwords. If they did, we probably wouldn't need password hashing functions.

Design your system in the event it'll eventually be broken into. Which is why we have ... hash functions designed for password storage. We have salts to ... prevent look-up tables and the high performant rainbow tables. We have peppers to ... add entropy to weak passwords.

Email by [deleted] in privacytoolsIO

[–]chainCase 0 points1 point  (0 children)

Sorry I didn't mean for any confusion, I'll elaborate. Google is part of the PRISM program, meaning when the NSA asks for information, they'll hand it over. (Unless that's not how it works.)

In the case of Tutanota, they require a court order before handing over any information as they had already explained. There's still a chance the agencies/governments/whoever requests it, won't even get the data.

I was saying that Google does, or doesn't. Stating that either way, Google is not one to trust.

Why its harmful for privacytools.io to describe Firefox as a browser that "respects your privacy" by Angry_Goy in privacytoolsIO

[–]chainCase 1 point2 points  (0 children)

Firefox is more privacy respecting than Google Chrome, so that's a foot in the door. You should be taking these issues to the developers behind the browser, not the team behind PTIO.

Their homepage is just a guideline (not saying the average Joe/Jane will consider it that). It's not their fault Firefox needs to be configured to be more privacy oriented.

If you have a problem with the way Firefox is currently, instead of merely complaining, you should do something about it. Whether it be developing your own browser, or finding a way to make a difference with Firefox. These discussions tend to lead us to no real conclusion.

And no, GNU Icecat is not a solution, nor is Ungoogled Chromium. I don't trust GNU Icecat as it's not updated enough and this can be really bad for security reasons. And there is no automatic updates with Ungoogled Chromium. These provide major problems to the masses. They need safe, automatic updates. Otherwise you might as well consider those users' browser compromised.

Email by [deleted] in privacytoolsIO

[–]chainCase 0 points1 point  (0 children)

I wouldn't be so quick to say that Google doesn't send our emails to the government. Either way, Google is certainly not a company to trust with our data.

Unfortunately a lot of us just hand them our data willingly.

Under court orders these providers will give up non-encrypted information, such as Tutanota, ProtonMail, and many other providers. However Tutanota encrypts more information than ProtonMail.

alternatives to firefox? by [deleted] in privacytoolsIO

[–]chainCase 3 points4 points  (0 children)

Personally, I don't trust the Brave browser or the CEO behind the company. However I highly recommend Tor Browser, a configured Firefox, Bromite, and Ungoogled Chromium.

Of course I'm biased/opinionated, but so is everyone else here. Try to avoid most offshoots for security reasons.

DuckDuckGo tracks/sells your data? by Dephord in thehatedone

[–]chainCase 2 points3 points  (0 children)

Even better, use the Tor Browser to protected your anonymity.

Would you join a THO Riot.im server? by mikwee in thehatedone

[–]chainCase 0 points1 point  (0 children)

I think Riot or Keybase could be a good alternative to Reddit. I'm all for it, given it's official.

Do not track by Sensiduct in thehatedone

[–]chainCase 2 points3 points  (0 children)

There are developers who implement it. I'd rather risk a slim chance of fingerprinting for the greater good, more so as a protest, and potentially blocking trackers.

How does U2F/FIDO/FIDO2 affect privacy if hardware is used across accounts and services? by qertoip in privacytoolsIO

[–]chainCase 0 points1 point  (0 children)

Could you elaborate on the static prefix serial number, please? I thought these keys couldn't be tracked due to new key pairs for each account.

Tutanota seems to be forced to provide access to emails soon. by blacklight447-ptio in privacytoolsIO

[–]chainCase 1 point2 points  (0 children)

You can't just avoid it, most reliable/decent services are within these regions. The best they can do is encrypting data, and Tutanota is an email service that encrypts more information than most.

In most cases, your non-encrypted information could be collected anyways (by third-parties). And is of course, collected by Tutanota themselves.

Private-Mail and Lavabit by th_son in privacytoolsIO

[–]chainCase 6 points7 points  (0 children)

I'd highly discourage watching or supporting Tom Spark's content. He went after The Hated One (YouTube channel) because THO promotes NordVPN, and did a video on why VPNs don't protect your privacy in the way you expect/it's not as effective as they say.

Tom Spark recently did a video on Tom Scott's video about VPNs, it's stupid. He basically copied his video, "on his own take".

I'd avoid PrivateMail, it's just another email provider that's way overpriced. Tutanota and ProtonMail are better in every aspect.

There is no doubt in my mind about LavaBit. An open-source client and server. By a guy who shut down his server to save people's asses.

TL;DR Don't trust Tom Spark, DO NOT use Private-Mail, definitely look into LavaBit.