Hacker News new | past | comments | ask | show | jobs | submit login

A crypto key in the URL would ruin the deniability - their web server logs would contain the decryption keys. The whole point is to run AES in Javascript in the browser so the key never reaches them.



Linking the key as the fragment identifier component (after a #) would prevent the server from seeing it, but still allow Javascript to have access to the key.

That way you can link encrypted content with a key, and have the server not know about it.

This scheme has been deployed for at least one secure pastebin.


Interesting. I didn't know the browser keeps that part to itself.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: