Hacker News new | past | comments | ask | show | jobs | submit login

One attack model is the one described in the article, that the links leaks to someone where it shouldn't be. In that case, an encryption key that is set to expire[1], would limit the scope of that leak. Of course, if someone would screenshot the image it could be too late, so the attack model does not include people that know the key will expire...

[1]: https://www.w3.org/TR/encrypted-media/#expiration-time




Or you can make the link set to expire.

Your approach isn't solving any problems, but adds to confusion. Keep in mind Google Photos is a consumer product meant to be used by everyone between tech savvy teenagers and your grandmother.


Unless you change your clock?


Why would the verifier change the clock?

If 'you' here is the key holder, changing clock isn't going to help.


What verifier? The scenario here is embedding an encrypted blob inside a static web page, and having the user input a key to decrypt inside their browser, right?

If you're going to have a server checking anything, you're on a whole different wavelength than this scheme. Why even use encryption at that point?




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: