Open uazo opened 1 year ago
so, no WinRT api available but I found this Issue 1333461: add application bound encryption primitives for chrome unfortunately it is a wip.
quite strange, in chrome there is no elevation service, but the value os_crypt.app_bound_fixed_data
exists, whereas in brave there is the service but not the exe file!
https://source.chromium.org/chromium/chromium/src/+/main:chrome/elevation_service/elevator.cc
In any case, the idea could be to exploit that method by digitally signing the executables and verifying the signature with the public key. I am a little disturbed by the use of hell com objects.
The aim is to protect config from other applications on the machine. Whereas to protect executables I should use the msi installer. I also saw that there is a new flag blocking the reading of cookie file during use, which should be activated if you enable data deletion on shutdown.
I should also start adding at least the proxy configuration to the secure prefs.
the idea is to use the seed
the disadvantage is that I will lose all the settings see also message_encrypter.cc
not make it public but integrated into the build process
I found a way, but it breaks the possibility of having a reproducible build. On the other hand, I will be able to make public the patch that activates cromite because the idea is to create a site that can verify that the browser installed is the one generated by this repo.
the disadvantage is that I will lose all the settings
no, it does not. meanwhile, in android it is not active. in windows it presents a message that allows the user to reset everything but it is not mandatory. this is fine for now, considering that the change will impact current installations.
Subscribing incase this changes, it makes it harder to clone/backup/move user profiles.
fix position of cromite_pref_hash_seed_bin
that parameter should only be active for desktop platforms, erroneously it is only active for android (which does not use it).
currently the use of secure preferences is not the same as that used in chrome, since there is no seed in chromium.
https://source.chromium.org/chromium/chromium/src/+/refs/heads/main:chrome/browser/prefs/chrome_pref_service_factory.cc;l=29
adding a seed in an open source code, however, would not serve security purposes. by the way, the method for extracting that value from the pak is already public. In addition, there are few preferences put under control, see kTrackedPrefs list and
Local State
doesn't really seem to be under control.so technically any application could modify the contents of those files