113
edits
(Clarified registration protocol) |
(Added vulnerabilities) |
||
| Line 329: | Line 329: | ||
} | } | ||
</pre> | </pre> | ||
===Vulnerabilities=== | |||
On deeper inspection of eXfio Peer v2 there are two vectors of attack that present themselves, a honeypot and a targeted phishing attack. | |||
====Honeypot==== | |||
An adversary could set up a sync server and invite users to join with say an offer of unlimited stage. When the user registers the hostile sync server initialises the storage with a fictitious authorised device, thus giving the impression that the user had previously registered with the service. The user could be presented with an authcode to enter on their device this transferring a pre-generated master key, known by the server, to the newly registered device. | |||
'''Countermeasures''' | |||
TODO | |||
====Targeted Phishing==== | |||
TODO | |||
'''Countermeasures''' | |||
TODO | |||
=== Registration Protocol v2 === | === Registration Protocol v2 === | ||
edits