<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: New Browser Tool Claims to Reveal MEGA Users&#8217; Master Key</title>
	<atom:link href="https://torrentfreak.com/new-browser-tool-claims-to-reveal-mega-user-master-key-130903/feed/" rel="self" type="application/rss+xml" />
	<link>https://torrentfreak.com/new-browser-tool-claims-to-reveal-mega-user-master-key-130903/</link>
	<description>Breaking File-sharing, Copyright and Privacy News</description>
	<lastBuildDate>Tue, 28 Oct 2014 17:48:34 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.2</generator>
	<item>
		<title>By: New Browser Tool Claims to Reveal MEGA Users’ Master Key &#124; BRYAN LENETT OFFICIAL WEBSITE - BryanLenett.com</title>
		<link>/new-browser-tool-claims-to-reveal-mega-user-master-key-130903/#comment-1133579</link>
		<dc:creator><![CDATA[New Browser Tool Claims to Reveal MEGA Users’ Master Key &#124; BRYAN LENETT OFFICIAL WEBSITE - BryanLenett.com]]></dc:creator>
		<pubDate>Fri, 13 Sep 2013 04:24:26 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=76541#comment-1133579</guid>
		<description><![CDATA[[&#8230;] by  mr-slappy   [link] [&#8230;]]]></description>
		<content:encoded><![CDATA[<p>[&#8230;] by  mr-slappy   [link] [&#8230;]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Quest</title>
		<link>/new-browser-tool-claims-to-reveal-mega-user-master-key-130903/#comment-1133050</link>
		<dc:creator><![CDATA[Quest]]></dc:creator>
		<pubDate>Wed, 11 Sep 2013 08:41:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=76541#comment-1133050</guid>
		<description><![CDATA[Why mega has to USE JAVASCRIPT cant it use more laggy and maybe little bit safer techs like JAVA. or ASP#  both of those can do encryption thinks. I do know that this issue here will be fixed but i am paranoid when it comes securing my document files. Being paranoid in security is good think.



But like all in security thinks. NOTHING is 100% safe. If company claims that then its false. If you ask why nothing 100% safe that is because there is no suck thinks as 100% security everything can be hacket or broken or workaround to be found. even highest encryption methods can be broken (in teory + time) brute force works but if you did not make 20-50 charracters long password then it can be broken in reasanably in time. (good password in key = brute force takes even with millions computer 10-20 years or more time) 



When it comes securing file backups if you want to be sure they are remain hidden(from everyone else eyes) you need encrypt them its not enough that place where you put them is encrypts files they need be encrypted in case mega safety fails, this is called fail safe. 



Fail safe works if megas gets court order subpoena to continue their thinks as normal but with feds(or police) watching their operations in multiple locations, but fail safe will work since IF they manage get files somehow but you have encrypted them in safety. What they can do? nothing.]]></description>
		<content:encoded><![CDATA[<p>Why mega has to USE JAVASCRIPT cant it use more laggy and maybe little bit safer techs like JAVA. or ASP#  both of those can do encryption thinks. I do know that this issue here will be fixed but i am paranoid when it comes securing my document files. Being paranoid in security is good think.</p>
<p>But like all in security thinks. NOTHING is 100% safe. If company claims that then its false. If you ask why nothing 100% safe that is because there is no suck thinks as 100% security everything can be hacket or broken or workaround to be found. even highest encryption methods can be broken (in teory + time) brute force works but if you did not make 20-50 charracters long password then it can be broken in reasanably in time. (good password in key = brute force takes even with millions computer 10-20 years or more time) </p>
<p>When it comes securing file backups if you want to be sure they are remain hidden(from everyone else eyes) you need encrypt them its not enough that place where you put them is encrypts files they need be encrypted in case mega safety fails, this is called fail safe. </p>
<p>Fail safe works if megas gets court order subpoena to continue their thinks as normal but with feds(or police) watching their operations in multiple locations, but fail safe will work since IF they manage get files somehow but you have encrypted them in safety. What they can do? nothing.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Terry4</title>
		<link>/new-browser-tool-claims-to-reveal-mega-user-master-key-130903/#comment-1132517</link>
		<dc:creator><![CDATA[Terry4]]></dc:creator>
		<pubDate>Mon, 09 Sep 2013 18:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=76541#comment-1132517</guid>
		<description><![CDATA[&quot;The list of these keys is encrypted with your password and stored on our server. Your own password is very important here: it never leaves your computer, so we do not know it. Hence, not even we can access your data.&quot;

Mega is working EXACTLY THE SAME!

https://mega.co.nz/#developers

Your master-key gets encrypted with your password (which is not transferred to Mega) before it is stored on their servers. All Koziarski did is displaying his own master-key on his own PC after he logged into his Mega account - the same could also &quot;happen&quot; with Wuala. This whole news-story is pointless.

And if you fear that Mega could update their code to do evil things (which Wuala could do too by the way) then install the Browser-Extension mentioned  by Van der Kolk that loads the code locally and disable auto-update:

https://mega.co.nz/#chrome]]></description>
		<content:encoded><![CDATA[<p>&#8220;The list of these keys is encrypted with your password and stored on our server. Your own password is very important here: it never leaves your computer, so we do not know it. Hence, not even we can access your data.&#8221;</p>
<p>Mega is working EXACTLY THE SAME!</p>
<p><a href="https://mega.co.nz/#developers" rel="nofollow">https://mega.co.nz/#developers</a></p>
<p>Your master-key gets encrypted with your password (which is not transferred to Mega) before it is stored on their servers. All Koziarski did is displaying his own master-key on his own PC after he logged into his Mega account &#8211; the same could also &#8220;happen&#8221; with Wuala. This whole news-story is pointless.</p>
<p>And if you fear that Mega could update their code to do evil things (which Wuala could do too by the way) then install the Browser-Extension mentioned  by Van der Kolk that loads the code locally and disable auto-update:</p>
<p><a href="https://mega.co.nz/#chrome" rel="nofollow">https://mega.co.nz/#chrome</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: kimberly537</title>
		<link>/new-browser-tool-claims-to-reveal-mega-user-master-key-130903/#comment-1132151</link>
		<dc:creator><![CDATA[kimberly537]]></dc:creator>
		<pubDate>Sun, 08 Sep 2013 19:44:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=76541#comment-1132151</guid>
		<description><![CDATA[as Dawn implied I&#039;m impressed that anyone can make $5786 in one month on the computer. imp source w­w­w.J­A­M­20.c­o­m]]></description>
		<content:encoded><![CDATA[<p>as Dawn implied I&#8217;m impressed that anyone can make $5786 in one month on the computer. imp source w­w­w.J­A­M­20.c­o­m</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: steve07</title>
		<link>/new-browser-tool-claims-to-reveal-mega-user-master-key-130903/#comment-1131869</link>
		<dc:creator><![CDATA[steve07]]></dc:creator>
		<pubDate>Sat, 07 Sep 2013 22:29:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=76541#comment-1131869</guid>
		<description><![CDATA[Late in my reply but worth it, oh yes!

Fact: In the UK it is impossible to be thrown in jail  (and anywhere else i would imagine) for the impossibility  of not providing impossible to exist non existing keys!

Honestly, i do so love such ridiculosity as such tautology, so i just got to have a great big (and exclaimed) LOL! LOL! LOL!

And to all who care, (maybe no one) Disqus has not only a hard time with the word Disqus but the word ridiculosity. How apt. Oh yes!]]></description>
		<content:encoded><![CDATA[<p>Late in my reply but worth it, oh yes!</p>
<p>Fact: In the UK it is impossible to be thrown in jail  (and anywhere else i would imagine) for the impossibility  of not providing impossible to exist non existing keys!</p>
<p>Honestly, i do so love such ridiculosity as such tautology, so i just got to have a great big (and exclaimed) LOL! LOL! LOL!</p>
<p>And to all who care, (maybe no one) Disqus has not only a hard time with the word Disqus but the word ridiculosity. How apt. Oh yes!</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Terrasque</title>
		<link>/new-browser-tool-claims-to-reveal-mega-user-master-key-130903/#comment-1131128</link>
		<dc:creator><![CDATA[Terrasque]]></dc:creator>
		<pubDate>Thu, 05 Sep 2013 20:08:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=76541#comment-1131128</guid>
		<description><![CDATA[From one that have actually done these things.. And sometimes do it as part of debugging at work.

Arp poison User.
Arp poison users router. &lt;-- not needed!
Claim to be the router... to user.
Claim to be the user..... to router. &lt;-- also not needed
Setup forwarding.

You sslstrip then .. oh wait, you can&#039;t. User connected with https directly via his bookmark. SSLstrip can&#039;t change anything without generating scary looking browser errors.

And even if he followed a link sslstrip can modify, or just wrote in without https, as long as he&#039;s been on the page even ONCE the last two years, the browser will refuse to connect to it via http, no matter what you do &lt;i&gt;(Header Strict-Transport-Security:max-age=63072000)&lt;/i&gt;.

So if you arp intercept the traffic successfully, run sslstrip, and the user have NEVER visited that page on his machine, then yeah, you could maybe do it. If the user didn&#039;t notice the HTTPS badge missing. Quite a lot of assumptions here, mate. And you can&#039;t fake a legit certificate. You can, &lt;i&gt;if you control a CA&lt;/i&gt;, make the CA issue a new certificate for the domain, but that&#039;s it.

&lt;i&gt;&quot;Just sniff , capture and modify traffic.&quot;&lt;/i&gt; - as I have explained, that&#039;s actually pretty hard to do. You have to be in the &quot;people NSA want to go after individually&quot; level before things get scary.. And there are of course ways to migrate that threat level too &lt;i&gt;(like convergence.io, and Mega&#039;s browser plugin)&lt;/i&gt;.

And btw, nitpick. You verify you are you by logging into the site, by knowing your account&#039;s password. That&#039;s kinda what passwords do. HTTPS verify the server is the server, so you don&#039;t send your login info to Johnny Hacker. So the server&#039;s identity is verified by it having a CA issued certificate. Your identify is verified by the knowledge of your account&#039;s password.

Also also, to read the key from the JS code, you need to execute your own code in the Mega webpage&#039;s execution domain in the browser. That means spyware (bookmarklet, malicious browser plugin, or malicious program running on your machine) or JS injection via either breaking SSL (which &lt;i&gt;IS&lt;/i&gt; hard, and nearly impossible against a careful, informed user) or Mega&#039;s server sending out malicious code (can also be migrated by a careful user).]]></description>
		<content:encoded><![CDATA[<p>From one that have actually done these things.. And sometimes do it as part of debugging at work.</p>
<p>Arp poison User.<br />
Arp poison users router. &lt;&#8211; not needed!<br />
Claim to be the router&#8230; to user.<br />
Claim to be the user&#8230;.. to router. &lt;&#8211; also not needed<br />
Setup forwarding.</p>
<p>You sslstrip then .. oh wait, you can&#039;t. User connected with https directly via his bookmark. SSLstrip can&#039;t change anything without generating scary looking browser errors.</p>
<p>And even if he followed a link sslstrip can modify, or just wrote in without https, as long as he&#039;s been on the page even ONCE the last two years, the browser will refuse to connect to it via http, no matter what you do <i>(Header Strict-Transport-Security:max-age=63072000)</i>.</p>
<p>So if you arp intercept the traffic successfully, run sslstrip, and the user have NEVER visited that page on his machine, then yeah, you could maybe do it. If the user didn&#8217;t notice the HTTPS badge missing. Quite a lot of assumptions here, mate. And you can&#8217;t fake a legit certificate. You can, <i>if you control a CA</i>, make the CA issue a new certificate for the domain, but that&#8217;s it.</p>
<p><i>&#8220;Just sniff , capture and modify traffic.&#8221;</i> &#8211; as I have explained, that&#8217;s actually pretty hard to do. You have to be in the &#8220;people NSA want to go after individually&#8221; level before things get scary.. And there are of course ways to migrate that threat level too <i>(like convergence.io, and Mega&#8217;s browser plugin)</i>.</p>
<p>And btw, nitpick. You verify you are you by logging into the site, by knowing your account&#8217;s password. That&#8217;s kinda what passwords do. HTTPS verify the server is the server, so you don&#8217;t send your login info to Johnny Hacker. So the server&#8217;s identity is verified by it having a CA issued certificate. Your identify is verified by the knowledge of your account&#8217;s password.</p>
<p>Also also, to read the key from the JS code, you need to execute your own code in the Mega webpage&#8217;s execution domain in the browser. That means spyware (bookmarklet, malicious browser plugin, or malicious program running on your machine) or JS injection via either breaking SSL (which <i>IS</i> hard, and nearly impossible against a careful, informed user) or Mega&#8217;s server sending out malicious code (can also be migrated by a careful user).</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Siti Internet Aziendali &#187; MEGA, la master key fuori dal codice</title>
		<link>/new-browser-tool-claims-to-reveal-mega-user-master-key-130903/#comment-1131041</link>
		<dc:creator><![CDATA[Siti Internet Aziendali &#187; MEGA, la master key fuori dal codice]]></dc:creator>
		<pubDate>Thu, 05 Sep 2013 16:17:39 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=76541#comment-1131041</guid>
		<description><![CDATA[[&#8230;] master key usata dal cyber-locker non è cifrata, sostiene lo sviluppatore di MEGApwn, e basta avere accesso al PC dell&#8217;utente per accedere [&#8230;]]]></description>
		<content:encoded><![CDATA[<p>[&#8230;] master key usata dal cyber-locker non è cifrata, sostiene lo sviluppatore di MEGApwn, e basta avere accesso al PC dell&#8217;utente per accedere [&#8230;]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Character assination much ?</title>
		<link>/new-browser-tool-claims-to-reveal-mega-user-master-key-130903/#comment-1130984</link>
		<dc:creator><![CDATA[Character assination much ?]]></dc:creator>
		<pubDate>Thu, 05 Sep 2013 13:33:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=76541#comment-1130984</guid>
		<description><![CDATA[&lt;i&gt;The list of these keys is encrypted with your password and stored on 
our server. Your own password is very important here: it never leaves 
your computer, so we do not know it. Hence, not even we can access your 
data. &lt;/i&gt;





safer.]]></description>
		<content:encoded><![CDATA[<p><i>The list of these keys is encrypted with your password and stored on<br />
our server. Your own password is very important here: it never leaves<br />
your computer, so we do not know it. Hence, not even we can access your<br />
data. </i></p>
<p>safer.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Character assination much ?</title>
		<link>/new-browser-tool-claims-to-reveal-mega-user-master-key-130903/#comment-1130977</link>
		<dc:creator><![CDATA[Character assination much ?]]></dc:creator>
		<pubDate>Thu, 05 Sep 2013 13:11:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=76541#comment-1130977</guid>
		<description><![CDATA[I am also getting tired of this shit.


I never said &quot;break ssl encryption protocols&quot;. You implied that is the ONLY way to mitm. It isn&#039;t. 

Also disregard that certificates are authentication added on, that 99% of the time are &lt;b&gt;one way&lt;/b&gt; verification that &lt;b&gt;the end user&lt;/b&gt; has to verify is legit. Like I said, my bank asks me for a response code via sms text to verify I am me. 

You can always forge/fake legit looking certificates btw.


OK. here goes. (average mitm) 

ONE WAY.... there are plenty more elaborate ways that if you use different tools, you can fake legit certificates etc...



Arp poison User.
Arp poison users router.
Claim to be the router... to user.
Claim to be the user..... to router.
Setup forwarding.
Done.


All traffic runs through you. You sslstrip then forward on the fly along with ripping site&#039;s pages too.

You could easily swap &quot;router&quot; for &quot;MEGA. site&quot; all you are spoofing is your identity, via hijacking the identity of both via arp poisoning.


You don&#039;t need to compromise the users computer. You don&#039;t need to break the encryption. There are lot&#039;s of other ways too.
Why would you want to break the encryption anyway. It is far easier and quicker to spoof being the endpoint. 





Finally, I agree that security isn&#039;t perfect.  

Sorta the point. Why even the slightest thing is a real issue. In isolation if you trust MEGA, which I do relatively btw.... then it is a non issue. BUT... Tools/exploits/vulnerabilities don&#039;t live in isolation. 


Where do you want your private key ?
On someones server ?
In an &quot;online connected&quot;  js DOM  ?

On your HD ?


If you upload already properly encrypted files to MEGA. MITM attack, MEGA site etc... will not be able to see the files content.  
Why is this such a bad thing to bring up ?


It is clearly better than having your private key available online.(even tho you may have to jump through hoops to get that private key online) It is still possible. Even if offline js encrypted.


Don&#039;t even need to compromise your system. Just sniff , capture and modify traffic. Maybe access the js DOM too.]]></description>
		<content:encoded><![CDATA[<p>I am also getting tired of this shit.</p>
<p>I never said &#8220;break ssl encryption protocols&#8221;. You implied that is the ONLY way to mitm. It isn&#8217;t. </p>
<p>Also disregard that certificates are authentication added on, that 99% of the time are <b>one way</b> verification that <b>the end user</b> has to verify is legit. Like I said, my bank asks me for a response code via sms text to verify I am me. </p>
<p>You can always forge/fake legit looking certificates btw.</p>
<p>OK. here goes. (average mitm) </p>
<p>ONE WAY&#8230;. there are plenty more elaborate ways that if you use different tools, you can fake legit certificates etc&#8230;</p>
<p>Arp poison User.<br />
Arp poison users router.<br />
Claim to be the router&#8230; to user.<br />
Claim to be the user&#8230;.. to router.<br />
Setup forwarding.<br />
Done.</p>
<p>All traffic runs through you. You sslstrip then forward on the fly along with ripping site&#8217;s pages too.</p>
<p>You could easily swap &#8220;router&#8221; for &#8220;MEGA. site&#8221; all you are spoofing is your identity, via hijacking the identity of both via arp poisoning.</p>
<p>You don&#8217;t need to compromise the users computer. You don&#8217;t need to break the encryption. There are lot&#8217;s of other ways too.<br />
Why would you want to break the encryption anyway. It is far easier and quicker to spoof being the endpoint. </p>
<p>Finally, I agree that security isn&#8217;t perfect.  </p>
<p>Sorta the point. Why even the slightest thing is a real issue. In isolation if you trust MEGA, which I do relatively btw&#8230;. then it is a non issue. BUT&#8230; Tools/exploits/vulnerabilities don&#8217;t live in isolation. </p>
<p>Where do you want your private key ?<br />
On someones server ?<br />
In an &#8220;online connected&#8221;  js DOM  ?</p>
<p>On your HD ?</p>
<p>If you upload already properly encrypted files to MEGA. MITM attack, MEGA site etc&#8230; will not be able to see the files content.<br />
Why is this such a bad thing to bring up ?</p>
<p>It is clearly better than having your private key available online.(even tho you may have to jump through hoops to get that private key online) It is still possible. Even if offline js encrypted.</p>
<p>Don&#8217;t even need to compromise your system. Just sniff , capture and modify traffic. Maybe access the js DOM too.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Terrasque</title>
		<link>/new-browser-tool-claims-to-reveal-mega-user-master-key-130903/#comment-1130888</link>
		<dc:creator><![CDATA[Terrasque]]></dc:creator>
		<pubDate>Thu, 05 Sep 2013 08:15:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=76541#comment-1130888</guid>
		<description><![CDATA[I&#039;m getting tired of this bullshit.

No security is perfect. Get used to it. Truecrypt secure? No, keyloggers exist. TPM secure? No, Blue Pill exist. And so on. Does that mean they&#039;re completely broken and insecure? Not at all. Most flaws in a layer is fixed by another layer, or can be ignored because the attack is so limited. I repeat, there&#039;s NO such thing as &quot;perfect security&quot; - it does not exist.

SSL have some weaknesses, but it&#039;s not broken - despite what you think - and is keeping things damn secure on a daily basis. Certificates secure the data in transit. CA Signed Certificates verify that the endpoint you&#039;re talking to is the endpoint you think you&#039;re talking to. Hence, why it stops MitM.

SSLstrip can sometimes &lt;i&gt;avoid&lt;/i&gt; SSL, but all modern browsers display clearly if it&#039;s https or not, and the RFC I mentioned tell browsers that that site shall only be contacted over https &lt;i&gt;(and yes, Mega use it. Which, unless it&#039;s your first time ever visiting the site in a browser, stops sslstrip completely)&lt;/i&gt;

Can you explain to me how you want to mitm an SSL connection, without breaking SSL? Please, I&#039;m listening. Put your money where your mouth is. Prove that you know what you&#039;re talking about. Enlighten me. Otherwise, don&#039;t even bother to reply.]]></description>
		<content:encoded><![CDATA[<p>I&#8217;m getting tired of this bullshit.</p>
<p>No security is perfect. Get used to it. Truecrypt secure? No, keyloggers exist. TPM secure? No, Blue Pill exist. And so on. Does that mean they&#8217;re completely broken and insecure? Not at all. Most flaws in a layer is fixed by another layer, or can be ignored because the attack is so limited. I repeat, there&#8217;s NO such thing as &#8220;perfect security&#8221; &#8211; it does not exist.</p>
<p>SSL have some weaknesses, but it&#8217;s not broken &#8211; despite what you think &#8211; and is keeping things damn secure on a daily basis. Certificates secure the data in transit. CA Signed Certificates verify that the endpoint you&#8217;re talking to is the endpoint you think you&#8217;re talking to. Hence, why it stops MitM.</p>
<p>SSLstrip can sometimes <i>avoid</i> SSL, but all modern browsers display clearly if it&#8217;s https or not, and the RFC I mentioned tell browsers that that site shall only be contacted over https <i>(and yes, Mega use it. Which, unless it&#8217;s your first time ever visiting the site in a browser, stops sslstrip completely)</i></p>
<p>Can you explain to me how you want to mitm an SSL connection, without breaking SSL? Please, I&#8217;m listening. Put your money where your mouth is. Prove that you know what you&#8217;re talking about. Enlighten me. Otherwise, don&#8217;t even bother to reply.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
