CryptPad is a user on social.weho.st. You can follow them or interact with them if you have an account anywhere in the fediverse. If you don't, you can sign up here.

CryptPad @cryptpad@social.weho.st

CryptPad boosted

Last minute I had to step in and make a presentation about @cryptpad project at OW2con. I used CryptPad #markdown slide deck. Very productive. Here is my presentation: youtube.com/watch?v=1CxtFBcOdD

New blog post about our adventures this week in using SharedWorker and ServiceWorker to speed up CryptPad:
blog.cryptpad.fr/2018/06/22/Fa

CryptPad boosted
CryptPad boosted
what naming scheme do you use for your computers (if any)?

(boost so more people can answer)
CryptPad boosted

@dr1ft
For @cryptpad project we use business buzzwords:
agile
bigdata
competitive
drilldown
enterprise
...

Just wrote a new blog post: Signing CryptPad blog.cryptpad.fr/2018/06/15/Si
Experiments with making a webapp secure even if the server is completely compromized.

CryptPad boosted

@christianbundy Yes, this is the weak link. There are 3 solutions that can work:
1. Forever-Cache the index.html -> Trust on first use model, browser reload resets it though...
2. Secure bookmarklet ( wiki.ripple.com/User:Justmoon/ ) which hash-checks index.html before loading it
3. A browser extension such as Signed Pages ( github.com/tasn/webext-signed- ) but this one is not blocking the page load so keys can leak while you're being notified that the site is insecure...

CryptPad boosted

@cathal @christianbundy
Yes, the code-integrity branch which I demoed in the presentation uses subresource integrity as well as Signed Pages to verify the index.html github.com/xwiki-labs/cryptpad

CryptPad boosted

@cathal @christianbundy
Would be cool to have a hash in the URL spec, something like: `sha256:<base64>:https://path/to/resource`

CryptPad boosted

@cjd @christianbundy
Now, it would be interesting to have a companion feature for anchor/link elements, where you could say "the document at this URI must match this hash": if the referenced document used sub resource hashes (in turn, verified by the link hash), then you could in theory get full rendered document verification from the initial link. Not confidentiality, though. And if dynamic responses are trusted from server, security ends there, too.

CryptPad boosted

@christianbundy
@cjd
If the server controls the HTML, they can do as they like. I think the idea of this feature is that HTML often references resources that are outside the server's control: JQuery etc. are often loaded from CDNs under the control of companies you shouldn't trust. Using a hash to verify means you can reject content you don't expect.

CryptPad boosted

@cjd Could the server send the wrong index.html and circumvent this check (or use their own hash)?

CryptPad boosted

Just demonstrated a @cryptpad experimental branch using subresource integrity and code signing to deal with the problem of server providing wrong javascript.
You can checkout the branch here: github.com/xwiki-labs/cryptpad but careful, it's very alpha...

New CryptPad with crypt-app! Check it out at cryptpad.fr/kanban/ and let us know what you think, here or in the community chat riot.im/app/#/room/#cryptpad:m

Happy GDPR day everyone, at CryptPad we didn't have much to do to become compliant, even usernames are encrypted...

Hanging out at today, stop by and grab a sticker