Skip to content
Snippets Groups Projects
  1. Dec 08, 2015
  2. Dec 03, 2015
  3. Dec 02, 2015
  4. Nov 30, 2015
  5. Apr 29, 2015
  6. Apr 27, 2015
  7. Apr 16, 2015
  8. Apr 08, 2015
  9. Apr 07, 2015
  10. Apr 05, 2015
  11. Apr 03, 2015
  12. Mar 23, 2015
  13. Mar 05, 2015
  14. Feb 05, 2015
  15. Jan 29, 2015
  16. Jan 28, 2015
  17. Jan 14, 2015
  18. Jan 07, 2015
  19. Dec 29, 2014
    • akwizgran's avatar
      Don't try to erase secrets from memory. · 358166bc
      akwizgran authored
      1. The things we're really trying to protect - contact identities,
      message contents, etc - can't be erased from memory because they're
      encapsulated inside objects we don't control.
      
      2. Long-term secrets can't be protected by erasing them from memory
      because they're stored in the database and the database key has to be
      held in memory whenever the app's running.
      
      3. If the runtime uses a compacting garbage collector then we have no
      way to ensure an object is erased from memory.
      
      4. Trying to erase secrets from memory makes the code more complex.
      
      Conclusion: Let's not try to protect secrets from an attacker who can
      read arbitrary memory locations.
      358166bc
  20. Dec 26, 2014
  21. Dec 05, 2014
  22. Nov 09, 2014
  23. Nov 05, 2014
  24. Nov 04, 2014
  25. Oct 29, 2014
  26. Oct 08, 2014
  27. Oct 07, 2014
  28. Oct 03, 2014
  29. Oct 02, 2014
  30. Jul 08, 2014
    • akwizgran's avatar
      Shut down the Tor process without hacks. · d406853f
      akwizgran authored
      Tor has a controller command, TAKEOWNERSHIP, and a configuration option,
      __OwningControllerProcess, that work together to ensure Tor shuts down
      when the controlling process dies and/or disconnects from the control
      port. By using them we can avoid creating runaway Tor processes that
      have to be killed with hacks.
      d406853f
  31. Jul 04, 2014
  32. May 09, 2014
Loading