Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Now it's possible for someone to ask the server to sign a blob that they only know the hash of. Is that an issue in your threat model? No idea.


I feel threat modelling is the really difficult part in gluing together known-good crypto parts into a solution.

I've glued together crypto library calls a few times, and I've implemented RFCs when I've done so, like HKDF[1].

But that isn't enough if the solution I've chosen can easily be thwarted by some aspect I didn't even consider. No point in having a secure door lock if there's an open window in the back.

[1]: https://www.rfc-editor.org/rfc/rfc5869




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: