Hacker Newsnew | past | comments | ask | show | jobs | submit | more viralpoetry's commentslogin

You are right, probably I should choose something less offensive, but I saw a different "Alzheimer" named project https://github.com/tpruzina/alzheimer and as this password "manager" does not need to store passwords at all, I have used this one.


Changing the name is easier now than later.


Hi, author here. You are right, the password is generated on the fly using URL, unique seed and provided passphrase. The extension javascript is sandboxed from the webpage, so it is not possible to obtain the inputs to the PBKDFunction from the context of website.

I have coded this for myself and using it more than 2 years. The only problems are with some dynamically created login forms, like new reddit login.


Actually, the use case is not cloud image at all. One of the first problems was how to overcome having preinstalled cloud-init, polipo and other packages shipped with the OS cloud images.


Alzheimer password generator - Chrome extension for domain dependent password generation

https://chrome.google.com/webstore/detail/alzheimer-password...

https://github.com/viralpoetry/alzheimer-password-generator


Looks good, but that's a really terrible name for it. Please consider changing it to something less insulting.


Sorry, it's Public Key Infrastructure


Location: Bratislava, Slovakia

Remote: YES

Willing to relocate: No

Technologies: Python, Reverse engineering - Ida, OllyDbg, Wireshark, Oracle Virtualbox, VMware, Subgraph Vega, Metaspolit, Git, GnuPG, Snort IPS, browser extension development (Chrome)

Résumé/CV: see linkedin, or request by email

Email: [email protected]

I can brainstorm an attack on your organization, and help you improve security. I can be part of a Tiger/Red team. I am able to audit, improve or design you key management within an organization. I know how Hardware Secure Modules (HSM) works. I can design and implement custom secure communication channel using open source implementations of ECDH, RSA, XSALSA, however. I can test an existing crypto implementation against test vectors, or find some obvious bugs in high level design. I can reverse engineer not so sophisticated malware found on your secretary's laptop, and even develop disinfection scripts. I am watching trends in cybercrime, malware and cryptography. I read scientific publications, blogs, news. I like to write my thoughts, occasionally I even publish something.

If you need infosec guy (or writer) in your remote team, please contact me.

https://github.com/viralpoetry https:// sk .linkedin.com/in/gasperpeter


I have created Alzheimer Password Manager on the same ideas as this one.

I believe the better idea is to use also user specific salt per browser. In that case, the passwords are more unique, and the threat model changes dramatically.

Current Threat Model:

* No one with an access to the PC with installed extension should be able to authenticate without knowing the correct passphrase.

* The same passphrase used in two different web browsers should produce two different passwords (cryptographic salt will solve this problem).

* If an attacker obtains password for some websites, she should not be able to derive passwords for another websites using that knowledge.

* Attacker should not be able to brute force master passphrase from the salt and knowledge of one password (PBKDF with lots of iterations).

* it provides protection against basic keyloggers (but they can read our salt from the memory / file...)

https://chrome.google.com/webstore/detail/alzheimer-password...

https://github.com/viralpoetry/password-generator


I have published experimental chrome extension which derives password from url, salt, and passphrase on the fly:

https://chrome.google.com/webstore/detail/alzheimer-password...

Source code & threat model: https://github.com/viralpoetry/password-generator


Some times ago I created my own file encryption software using libsodium. It uses XSalsa20, hmacsha256, pbkdf. It hide password input on the terminal. It is really slow for large files (GBs)...

https://github.com/viralpoetry/VPcrypt


Yours uses symmetric keys while miniLock is public-key crypto (crypto_box in NaCl terms).


Thank you for checking it out. I used it just myself, hence symmetric crypto only.


I made a simple html based visualisation of buffer overflow vulnerabilities. Check at http://viralpoetry.org/en/gets.html or http://viralpoetry.org/en/strcpy.html


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: