-
Notifications
You must be signed in to change notification settings - Fork 90
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Secure Preferences is not really secure #76
Comments
so, no WinRT api available but I found this Issue 1333461: add application bound encryption primitives for chrome unfortunately it is a wip. quite strange, in chrome there is no elevation service, but the value https://source.chromium.org/chromium/chromium/src/+/main:chrome/elevation_service/elevator.cc In any case, the idea could be to exploit that method by digitally signing the executables and verifying the signature with the public key. I am a little disturbed by the use of hell com objects. The aim is to protect config from other applications on the machine. Whereas to protect executables I should use the msi installer. I should also start adding at least the proxy configuration to the secure prefs. |
the idea is to use the seed
the disadvantage is that I will lose all the settings |
I found a way, but it breaks the possibility of having a reproducible build.
no, it does not. |
Subscribing incase this changes, it makes it harder to clone/backup/move user profiles. |
fix position of cromite_pref_hash_seed_bin that parameter should only be active for desktop platforms, erroneously it is only active for android (which does not use it). |
currently the use of secure preferences is not the same as that used in chrome, since there is no seed in chromium.
https://source.chromium.org/chromium/chromium/src/+/refs/heads/main:chrome/browser/prefs/chrome_pref_service_factory.cc;l=29
adding a seed in an open source code, however, would not serve security purposes. by the way, the method for extracting that value from the pak is already public.
In addition, there are few preferences put under control, see kTrackedPrefs list and
Local State
doesn't really seem to be under control.so technically any application could modify the contents of those files
The text was updated successfully, but these errors were encountered: