{"id":32592,"date":"2017-07-18T12:45:30","date_gmt":"2017-07-18T16:45:30","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/dev-to-el-reg-making-web-pages-pretty-is-harder-than-building-crypto-the-register.php"},"modified":"2017-07-18T12:45:30","modified_gmt":"2017-07-18T16:45:30","slug":"dev-to-el-reg-making-web-pages-pretty-is-harder-than-building-crypto-the-register","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/dev-to-el-reg-making-web-pages-pretty-is-harder-than-building-crypto-the-register.php","title":{"rendered":"Dev to El Reg: Making web pages pretty is harder than building crypto &#8211; The Register"},"content":{"rendered":"<p><p>    +Comment An Australian    computer scientist working in Thailand has offered his    contribution to Australia's cryptography debate by creating a    public-key crypto demonstrator in less than a day, using public    APIs and JavaScript.  <\/p>\n<p>    Brandis.io not a useful encryption    implementation (the site itself says as much), but is a useful    public education exercise.  <\/p>\n<p>    By using the WebCryptoAPI, author Dr Peter Kelly has    implemented end-to-end crypto in just 445 lines of JavaScript    code.  <\/p>\n<p>    As Kelly writes at GitHub, Brandis does not implement    encryption itself; instead, it relies on the Web Cryptography    API provided by your browser, and simply exposes a user    interface to this API that enables its use by non-programmers.  <\/p>\n<p>    Hence its smallness: the cryptography is already out there, in    the form of straightforward calls to public APIs: there's more    JavaScript devoted to screen furniture than to generating    public and private keys, or encrypting\/decrypting the messages.  <\/p>\n<p>      Dr Kelly's Brandis.io crypto demonstrator    <\/p>\n<p>    As Kelly told Vulture South: I spent way more time on [the    presentation] than I did on the crypto-using code. Picking a    colour scheme took longer than writing the code for generating    a public\/private key pair.  <\/p>\n<p>    Kelly warns visitors to the site not to treat this as a    messaging platform: Brandis is primarily intended as a    demonstration; it was put together in less than a day. For    real-world usage, we recommend more established software such    as GnuPG.  <\/p>\n<p>    By the way, if you decide to try Brandis.io, note that its    current message size limit is 190 characters. Kelly's    investigating why that's so.   <\/p>\n<p>    +Comment: Vulture South notes that kelly's efforts only    addresses one part of the debate the Australian government    ignited when its Attorney-General George Brandis fired the    latest shot in what's being colloquially called CryptoWars 2.    The other half is device security.  <\/p>\n<p>    A common critique levelled at those who resist the idea of    governments undermining encryption (the so-called war on    mathematics, highlighted when Prime Minister Malcolm Turnbull        unhelpfully quipped that Australia's laws will prevail over    he laws of mathematics) is that they've got the wrong end of    the stick, because messages could be recovered by means that    don't attack encrypted messages in transit, but rather while    they're at rest  for example, by recovering messages as stored    on devices like iPhones or Androids.  <\/p>\n<p>    First, it's worth keeping in mind that the government itself    drew attention towards strong encryption, with its complaint    that singled out specific end-to-end encrypted applications,    and its promise to get platform-makers to co-operate (as well    as device vendors).  <\/p>\n<p>    More importantly, however, the argument that an endpoint    compromise is okay ignores history. Whether it's the sloppy IoT    security let the Mirai    botnet hose big servers or the leaked NSA tools that let    loose     ransomware rampages, or the     DNS Changer malware attack that began in 2006, there's    ample evidence of the danger posed by insecure endpoints.  <\/p>\n<p>    You can't have security if you have insecure endpoints was    first expressed to this writer in the 1990s, and it's still    true. We can't redirect concerns about weak cryptography by    saying you can still have strong crypto, if vendors will make    weak devices.  <\/p>\n<p>    Even the NSA couldn't keep device exploits secret, after all.   <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>More here:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2017\/07\/17\/encryption_with_apis_and_445_lines_of_js\/\" title=\"Dev to El Reg: Making web pages pretty is harder than building crypto - The Register\">Dev to El Reg: Making web pages pretty is harder than building crypto - The Register<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> +Comment An Australian computer scientist working in Thailand has offered his contribution to Australia's cryptography debate by creating a public-key crypto demonstrator in less than a day, using public APIs and JavaScript. Brandis.io not a useful encryption implementation (the site itself says as much), but is a useful public education exercise. By using the WebCryptoAPI, author Dr Peter Kelly has implemented end-to-end crypto in just 445 lines of JavaScript code<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-32592","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32592"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=32592"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32592\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=32592"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=32592"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=32592"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}