[liberationtech] Browser extensions or native application for crypto? Was: Whiteout OpenPGP.js encrypted mail client (Chrome HML5 App)

Tony Arcieri bascule at gmail.com
Thu Jan 23 17:55:04 PST 2014


On Thu, Jan 23, 2014 at 3:05 AM, Fabio Pietrosanti (naif) <
lists at infosecurity.ch> wrote:

> Browser extension could be hacked if they are unsafe, trough the use of
>
XSS-like attack techniques, by triggering an external payload into it
> (for example from a website visited by the user).
>

...but as long as they can't break out of the browser's sandbox, they can't
be used to compromise native applications.

So browser exploits affect:

1) Browser extensions and other in browser data


> Native applications could be hacked if they are unsafe, trough the use
> of buffer/heap overflow like techniques, by triggering an external
> exploit payload (for example by sending an email to a
> thunderbird/enigmail target user).
>

But the browser is a native code application! So native code exploits
affect:

1) Browser extensions and other in browser data
2) Native applications

So, my personal feeling is that chrome browser extensions can provide a
> better secure environment for crypto applictions than the native ones.


No, browser extensions have *more attack surface* than native applications.
If you're pwned at a native code level, everything you're doing in browsers
is vulnerable too.

Provided you are able to obtain a good build of a well-audited native
crypto app, it's sandboxed from browser-based attacks via the browser.

If you are able to obtain a good build of a well-audited Chrome extension,
it's still potentially susceptible to browser-based attacks.

In either case, if the crypto software itself is compromised, it's
effectively game over. Using a native code app will airgap you from
browser-based attacks (kind of)

-- 
Tony Arcieri
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.stanford.edu/pipermail/liberationtech/attachments/20140123/e4aa4d3b/attachment.html>


More information about the liberationtech mailing list