<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: blastrock</title><link>https://news.ycombinator.com/user?id=blastrock</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Tue, 14 Apr 2026 20:50:33 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=blastrock" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by blastrock in "Bypassing disk encryption on systems with automatic TPM2 unlock"]]></title><description><![CDATA[
<p>Thanks for the link!<p>Funny to see that someone already thought of this attack in 2022</p>
]]></description><pubDate>Fri, 24 Jan 2025 08:42:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=42811528</link><dc:creator>blastrock</dc:creator><comments>https://news.ycombinator.com/item?id=42811528</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42811528</guid></item><item><title><![CDATA[New comment by blastrock in "Bypassing disk encryption on systems with automatic TPM2 unlock"]]></title><description><![CDATA[
<p>Very clever!<p>I am the author of one of the older guides <a href="https://blastrock.github.io/fde-tpm-sb.html" rel="nofollow">https://blastrock.github.io/fde-tpm-sb.html</a> .<p>I was wondering about the solution you propose which seems a bit complicated to me. Here's my idea, please tell me if I'm completely wrong here.<p>What if I put a file on the root filesystem with some random content (say 32 bytes), let's name it /prehash. I hash this file (sha256, blake2, whatever). Then, in the signed initrd, just after mounting the filesystem, I assert that hash(/prehash) == expected_hash or crash the system otherwise. Do you think it would be enough to fix the issue?</p>
]]></description><pubDate>Fri, 17 Jan 2025 18:47:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=42741854</link><dc:creator>blastrock</dc:creator><comments>https://news.ycombinator.com/item?id=42741854</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42741854</guid></item><item><title><![CDATA[New comment by blastrock in "FileKit: An open source end-to-end encrypted cloud storage service in JavaScript"]]></title><description><![CDATA[
<p>The encryption/upload <i>is</i> streamed, but the download/decryption is not, we will work on that. Thanks for the link!</p>
]]></description><pubDate>Fri, 30 Aug 2019 07:03:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=20836477</link><dc:creator>blastrock</dc:creator><comments>https://news.ycombinator.com/item?id=20836477</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=20836477</guid></item><item><title><![CDATA[New comment by blastrock in "FileKit: An open source end-to-end encrypted cloud storage service in JavaScript"]]></title><description><![CDATA[
<p>Actually, Filekit is meant to be integrated into an application, and that application is responsible for delivering JS and handling identities, not the Tanker server.</p>
]]></description><pubDate>Thu, 29 Aug 2019 21:46:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=20834022</link><dc:creator>blastrock</dc:creator><comments>https://news.ycombinator.com/item?id=20834022</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=20834022</guid></item><item><title><![CDATA[New comment by blastrock in "Tanker: End-to-End Encryption SDK for JavaScript"]]></title><description><![CDATA[
<p>No, the unlock key is for the user to keep, and never be transmitted by anyone else than the user themselves. If you do the transmission, it's not end to end anymore.<p>This option is only for users concerned about security, the other unlock methods are less strong but still provide security.</p>
]]></description><pubDate>Wed, 22 May 2019 21:55:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=19985976</link><dc:creator>blastrock</dc:creator><comments>https://news.ycombinator.com/item?id=19985976</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=19985976</guid></item><item><title><![CDATA[New comment by blastrock in "Tanker: End-to-End Encryption SDK for JavaScript"]]></title><description><![CDATA[
<p>TweetNaCl is roughly equivalent to libsodium, on which Tanker builds. Tanker is easier to integrate into your app because it takes care of key sharing, multi-devices, user group managment, etc. These are all things you would have to handle by yourself using just a cryptographic library like TweetNaCl.</p>
]]></description><pubDate>Wed, 22 May 2019 19:10:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=19984442</link><dc:creator>blastrock</dc:creator><comments>https://news.ycombinator.com/item?id=19984442</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=19984442</guid></item><item><title><![CDATA[New comment by blastrock in "Tanker: End-to-End Encryption SDK for JavaScript"]]></title><description><![CDATA[
<p>> how the Trustchain Private Key is "obtained".<p>The Trustchain private key is generated when you create a Trustchain. It is generated on <i>your</i> machine. You can try it and create a Trustchain yourself here: <a href="https://dashboard.tanker.io/" rel="nofollow">https://dashboard.tanker.io/</a><p>> And finally, if the private key really is generated on your service, we can just pack up and go home.<p>It is not :)<p>> What it sounds like you have is a PKI infrastructure with open source SDK and "end-to-end" encryption of things, as much as end-to-end applies for keys/trust roots generated anywhere but locally.<p>That's pretty much it. The trust root is that Trustchain key, and Tanker never sees its private part.<p>> Regarding the service, my main issue is that with an open source SDK you're aiming at a certain type of people, developers, like many of us, but I see no mention of the algos used which immediately causes me to lose interest (between that and the sales/marketing heavy website). If you're really targeting developers I would suggest losing the marketing babble and get down to brass tacks.<p>I take note of this. The parts targeted at developers available at the moment are the documentation, the code examples, and the SDK sources. We will write and publish something that explains how it works under the hood.</p>
]]></description><pubDate>Wed, 22 May 2019 19:04:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=19984379</link><dc:creator>blastrock</dc:creator><comments>https://news.ycombinator.com/item?id=19984379</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=19984379</guid></item><item><title><![CDATA[New comment by blastrock in "Tanker: End-to-End Encryption SDK for JavaScript"]]></title><description><![CDATA[
<p>> Is libsodium WASMed for the browser?<p>It is not WASMed yet, but we are working on it.<p>> It would be nice if Tanker exposed the cryptography operations, so it could be a more re-usable library. Is this possible?<p>Tanker is more of a high-level library. It focuses on the ease of use, and tries to be hard to misuse, so it does the key handling and uses fixed algorithms.</p>
]]></description><pubDate>Wed, 22 May 2019 16:19:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=19982759</link><dc:creator>blastrock</dc:creator><comments>https://news.ycombinator.com/item?id=19982759</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=19982759</guid></item><item><title><![CDATA[New comment by blastrock in "Tanker: End-to-End Encryption SDK for JavaScript"]]></title><description><![CDATA[
<p>You are right, you'd still have to trust the webmail/chat provider if you want to chat securely. Tanker still protects against data leaks from the app servers in this case.<p>We also provide SDKs for Android and iOS. They protect against more threats as you can install an app you know the provenance and the app doesn't auto update like a website that you reload every time you open your browser. If you are concerned about security, you could even compile the apps yourself in this case.</p>
]]></description><pubDate>Wed, 22 May 2019 15:51:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=19982480</link><dc:creator>blastrock</dc:creator><comments>https://news.ycombinator.com/item?id=19982480</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=19982480</guid></item><item><title><![CDATA[New comment by blastrock in "Tanker: End-to-End Encryption SDK for JavaScript"]]></title><description><![CDATA[
<p>Tanker developer here. We use libsodium as our underlying cryptographic library. It uses XChacha20/Poly1305 for symmetric encryption, Curve25519 for asymmetric encryption and signature, and Blake2 for hashing.</p>
]]></description><pubDate>Wed, 22 May 2019 15:38:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=19982335</link><dc:creator>blastrock</dc:creator><comments>https://news.ycombinator.com/item?id=19982335</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=19982335</guid></item></channel></rss>