HACKERALERT / Picocrypt

A very small, very simple, yet very secure encryption tool.
GNU General Public License v3.0
2.42k stars 145 forks source link

picocrypt informs the attacker that key files were used during encryption #167

Closed hakavlad closed 1 year ago

hakavlad commented 1 year ago

Expected behavior: picocrypt does not tell the attacker whether keyfiles or passwords were used during the encryption.

pico

HACKERALERT commented 1 year ago

This wouldn't help because whether keyfiles are used or not is stored as a flag in the header. So for a standard volume, a hacker can just look at the raw header to tell if keyfiles were used or not. If you don't want this behaviour, you can use the deniable mode which will encrypt the header so that no one knows whether you used keyfiles or not unless they enter the correct password.

hakavlad commented 1 year ago

hacker can just look at the raw header to tell if keyfiles were used or not

This is the problem: picocrypt gives hackers hints when using default values. Okay, this problem can't be fixed without breaking backwards compatibility.

HACKERALERT commented 1 year ago

Well, remember the target audience for Picocrypt -- the average Internet user. They won't care that much about whether a hacker can tell whether they used keyfiles or not. In fact, the average person probably won't use any keyfiles at all. For the advanced users who need that protection, the deniability feature exists. I think that's a pretty good balance of usability and security. Besides, knowing that keyfiles are being used does not effectively decrease security since security through obscurity doesn't do much. Knowing that the door to a house is locked doesn't make it any easier to get inside.

hakavlad commented 1 year ago

the target audience for Picocrypt -- the average Internet user

I think that's a pretty good balance of usability and security.

I did not see the phrase "the average Internet user" in the README. But I saw the following words there: "It's designed for maximal security, making absolutely no compromises security-wise".

HACKERALERT commented 1 year ago

For the standard usage and user, there are no compromises being made. High Argon2 parameters with XChaCha20 encryption and Blake2 authentication is not a compromise in any way. Neither is using any of the advanced features or keyfiles generated with the built-in generator. But if it really bothers you that much, I can remove that sentence entirely.

Picocrypt is a very small (hence Pico), very simple, yet very secure encryption tool that you can use to protect your files. It's designed to be the go-to tool for encryption, with a focus on security, simplicity, and reliability. Picocrypt uses the secure XChaCha20 cipher and the Argon2id key derivation function to provide a high level of security, even from three-letter agencies like the NSA. Your privacy and security is under attack. Take it back with confidence by protecting your files with Picocrypt.

HACKERALERT commented 1 year ago

Alright, I will do it later today. Thanks for the feedback.

HACKERALERT commented 1 year ago

Removed. Hopefully the introduction paragraph sounds better now.