Slacky Nick 

7 Followers
11 Following
27 Posts
Not actually verified lol
Blogblog.warmwolf.com
Twittertwitter.com/mytoiletpaper
I was at a mental health first aid training, and the instructor mentioned “the government is tracking you” as an example of delusional beliefs. Not sure where to begin on that…
(This is a 9-core VM!)
TILT the number of penguins (or other symbols) at boot up represents the number of CPU cores you have.
I wish we have artists who want to see the world burn by releasing emoji song titles
Can't wait for companies to implement ChatGPT, trained on their support documents and FAQs, as their support bots. Equally unhelpful and equally frustrating, win win!

Looking into @passbolt (open-source password manager for teams/personal) and have been impressed so far 🤔 It can be hosted or self-hosted, passwords are encrypted on server, and best of all, they published a security white paper: https://help.passbolt.com/assets/files/Security%20White%20Paper%20-%20Passbolt%20Pro%20Edition.pdf

Some summary:

When you create an account, a PGP key pair is created. The private key is stored locally in browser extensions (and in 2023, desktop apps). This key is wrapped with a local passphrase (different devices can have different passphrases).

To create a new 'item'/secret, the user enters their passphrase to decrypt the private key, which is used to encrypt and sign the item. All sensitive data manipulation happens locally, the server will not have access to decrypted data. This is to remove trust from the server.

By default, for each item, its password and description are encrypted. The resource name (e.g. "Google"), URI (gmail‍.com), username ("...@‍gmail.‍com"), users (that can access the item), and comments (between users) are not encrypted. (This is not a true zero-knowledge system)

Apart from mobile apps (and the desktop apps that are coming in 2023), the interface is a web app (at your domain if self-hosted) but the smart thing is that the server still does not have access to your items/passwords!

Instead, the web app (https://yourdomain.‍com) contains an iframe (moz-extension:‍//). The browser ext decrypts your data and inserts them into this iframe. Thanks to Cross-Origin Policies, the web app/server cannot access your decrypted data, even if it was compromised. This means that decrypted sensitive data never goes to the server, and therefore end-to-end encryption is achieved.

Because it is designed for password sharing among teams, each team member gets their own key pair during sign-up, and thus the secret/password can be encrypted separately for each user with their own public key.

Some huge pluses:
+ Less trust on the server. Sensitive data are manipulated locally. No key derivatives server-side.
+ Open-source, free, self-hosted, open API. Can be used internally without internet access. New features added rapidly.
+ Uses PGP, can use any tools you like.

Some drawbacks (to my understanding):
- Not true zero knowledge system.
- Having to rely on browser exts. Safari support is not prioritised at all.
- Private key is not ephemeral (it's just like a password). No backward secrecy.

One interesting fact to add is that (based on my understanding) given the open-source nature, it's technically possible to detect if the server wants to steal your password via the 'share' function. Because when you share passwords, you need to encrypt them with the recipient's public key. As long as you can verify the public key, you should not be able to get MITM'ed by the server. Also, the server can't share all passwords to itself secretly, if you can verify the public key.

In conclusion, I'm pretty impressed by Passbolt! Thanks for reading and definitely check them out at passbolt.com

I did get banned from an anonymous chat app for reporting a bug b4. 😂 In this app sending urls was a paid only feature. Idk how I accidentally used the wrong brackets. I used {} instead of () thinking back on my keyboard rn. They are in the same position. But used to surround urls in () so it's easier to copy n paste.

Well using {} made the link hyperlinkable somehow. So I reported it to the devs and they just banned me. 💀Later I did email them in another time. Their reason was I was basically summed up with: I was using the app incorrectly. 🤔😫

This VPN company gives you un-hackable IP address! Everyone should be using it!

(Jokes aside, it was probably intentional that they put in an invalid IP address, as the exact address is not the point.)

Hello world!