banner



Mega responds to security concerns; promises some changes - holtzdestoo92

Representatives of fresh launched file-storage and sharing service Mega addressed much of the concerns raised away security researchers in Holocene epoch days about the place's architecture and the implementation of its cryptographic features.

The Internet entrepreneur and accused digital unlawful Kim Dotcomrecently launched Mega (short for Mega Encrypted Global Access), which features 50GB of free storage. Mega is just one component of what Dotcom and his team hope will equal a suite of online encrypted services from Mega Ltd. including email, voice career, instant messaging, and television streaming.

In a web log post published Tuesday, Mega officials acknowledged that some of the security risks pointed out away researchers are valid, but said that users had already been informed about some of them through and through the FAQ (Frequently Asked Questions) section of the website. In the case of other issues, they secure some improvements.

For example, it has been pointed out that the encryption keys generated by users during the mansion-raised process, and which are later wont to encrypt their files, are encrypted using the account password and are only stored along Mega's servers. Since on that point is no password retrieval feature, users will lose the ability to decrypt their files if they forget their passwords, some people aforementioned.

"This is chastise—the only cardinal that MEGA requires to be stored on the user side is the login countersign, in the user's brain," the Mega officials said. "This password unlocks the professional describe, which in turn unlocks the file/folder/share/inward keys."

Nevertheless, a mechanism that volition countenance the recovery of files in case the password is forgotten volition be enforced in the near future, they said. This will include an option to modify the password and import pre-exported file keys ready to recover the corresponding files.

Security researchers also noted the fact that the master encoding keys are generated at bottom the web browser on house-rising victimisation the maths.random JavaScript function and warned that this function doesn't do a good job of generating random numbers, which way that the resulting keys power be adynamic from a cryptographic stand.

In response, the Mega officials said that entropy—stochasticity—is added by using information equanimous from the user's mouse and keyboard. "We volition, however, add a feature that allows the user to add equally more than entropy manually as he sees fit earlier proceedings to the headstone generation," they aforesaid.

The Mega representatives also processed how the site's JavaScript verification arrangement industrial plant, noting that the intense HTTPS waiter that uses a SSL certificate with a 2048-bit paint is used to aver the unity of the JavaScript code served from alternate HTTPS servers that use certificates with 1024-bit keys. "This fundamentally enables USA to host the passing integrity-sensitive static content connected a large number of geographically diverse servers without worrying about security," they said.

A researcher named Steve Norman Thomas, known online as "Sc00bz," recovered Tuesdaythat links included in the confirmation emails sent by Mega during the account registration process actually contain the user's password hasheesh.

Doubting Thomas released a tool called MegaCracker that can comprise wont to extract the hashes from such links and attempt to crack them exploitation a dictionary attack.

Commenting connected the tool's release, the Mega officials said that MegaCracker is "an excellent admonisher not to use guessable/dictionary passwords, specifically non if your password also serves as the maestro encryption key to all files that you store along MEGA."

However, they failed to address the question of why account confirmation links sent via email contain the user's password hash in the first rank. The general technique used by other websites is to give random codes specifically for check links.

In order to preclude potential attackers from obtaining their word hash at a later time, users should probably delete the Mega confirmation netmail after they dog on the included link and set up their accounts.

Source: https://www.pcworld.com/article/456584/mega-responds-to-security-concerns-promises-some-changes.html

Posted by: holtzdestoo92.blogspot.com

0 Response to "Mega responds to security concerns; promises some changes - holtzdestoo92"

Post a Comment

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel