• by 8organicbits on 1/6/2024, 8:30:42 PM

    I think I follow the proposal, but I have a few questions.

    It sounds like you enter your email and then you'd get an email with the session key. You mention copy/paste, why not use a URL with the key embedded (typically after a # as this part stays on the client)?

    I think you'll need to send Javascript down to the client to perform the encryption. That code needs access to the session key. Unfortunately, if the SSL session is invalid (like a MITM attack using a self-signed cert) then the attacker can inject their own Javascript to steal your session key.

    Is the session key stored in local storage? Is anything protecting it there? I think, similar to a JWT, it can be stolen.

    This is unfortunately a hard problem you're trying to solve.

  • by vitalipom on 1/13/2024, 7:58:43 PM

    I will make a demo hijecking myself account and how do I do it and show with example yo you guys how all of us are vulnerable.