- Jan 14, 2015
- Dec 29, 2014
-
-
akwizgran authored
1. The things we're really trying to protect - contact identities, message contents, etc - can't be erased from memory because they're encapsulated inside objects we don't control. 2. Long-term secrets can't be protected by erasing them from memory because they're stored in the database and the database key has to be held in memory whenever the app's running. 3. If the runtime uses a compacting garbage collector then we have no way to ensure an object is erased from memory. 4. Trying to erase secrets from memory makes the code more complex. Conclusion: Let's not try to protect secrets from an attacker who can read arbitrary memory locations.
-
- Dec 05, 2014
-
-
akwizgran authored
-
- Nov 09, 2014
-
-
akwizgran authored
-
- Nov 05, 2014
-
-
akwizgran authored
-
- Nov 04, 2014
-
-
akwizgran authored
-
- Oct 29, 2014
-
-
akwizgran authored
-
- Oct 08, 2014
-
-
akwizgran authored
-
- Oct 07, 2014
-
-
akwizgran authored
This should make it easier for people to build the project with a freshly downloaded ADT Bundle.
-
- Oct 03, 2014
- Oct 02, 2014
-
-
akwizgran authored
We don't need two separate executors for long-running IO threads.
-
- Jul 08, 2014
-
-
akwizgran authored
Tor has a controller command, TAKEOWNERSHIP, and a configuration option, __OwningControllerProcess, that work together to ensure Tor shuts down when the controlling process dies and/or disconnects from the control port. By using them we can avoid creating runaway Tor processes that have to be killed with hacks.
-
- Jul 04, 2014
-
-
akwizgran authored
-
- May 09, 2014
- May 02, 2014
- May 01, 2014
- Apr 30, 2014
-
-
akwizgran authored
-
- Apr 24, 2014
-
-
akwizgran authored
-
- Apr 18, 2014
-
-
akwizgran authored
-
- Apr 10, 2014
-
-
akwizgran authored
-
- Apr 07, 2014
-
-
akwizgran authored
Thanks to the team that audited CryptoCat for this idea. :-)
-
- Apr 05, 2014
- Apr 04, 2014
- Apr 03, 2014
-
-
akwizgran authored
-
- Apr 02, 2014
-
-
akwizgran authored
-
- Apr 01, 2014
-
-
akwizgran authored
-