Refresh our memory on what we learned in 2017/2018, which ultimately led to us removing that "feature" from our web platform (redd.it/8wenmw) and started an effort to get other projs to remove this antipattern.

Tweet thread will be for DeSo but other projs take note
First, let's start with what DeSo is and isn't, so we can describe its potential scope to users.

DeSo itself is a L1 blockchain, however it offers an identity solution on its subdomain with a public code lib that apps can use to help user onboarding

docs.deso.org/identity/ident…
This onboarding allows users to authenticate via Google or input their seed phrase (which also generates a seed phrase if you are new)

Summary: Seed generation is done within the iframe and stored (encrypted) in LocalStorage ImageImage
First, let's discuss the technical implications of this design choice.

The encryption happens client side, with an encryption key based on the hostname using the identity service

However, since it's all stored this way, something with higher privileges in the browser can read..
For example, with a browser extension, we can read all the data from DeSo identity and exfil to somewhere

I created a PoC that would so this.

Although we can get the EC PK, the secret recovery phrase is unencrypted in LocalStorage

github.com/409H/poc-deso-… Image
If you think there is not malicious interest in browser extensions, you are wrong.

Not only do I (author of ext with ~50k installs) offers to buy my ext namespace every month, we have seen developer accounts being compromised

pandasecurity.com/en/mediacenter…

The social implications are worse as it is teaching people to type their secrets into a website for authentication, smth that bad actors will capitalise on (and they still do from when the tech was still new and this pattern was "normal" in 2016..2018)

Users will become accustomed to "oh its fine with DeSo, so I'll do it here" and it will create a very bad expensive habit for your end-users.

Your persistent locally stored data will be safe with DeSo, until it isn't.
Asking for raw secrets on a website is not needed, especially with the tech/packages we have today

Web3Modal (@pedrouid) has a lot of out-of-the-box providers to allow for external trusted-battletested key management solutions to be implemented into app

github.com/Web3Modal/web3…
But DeSo is not the only project that has done this, but they do seem to be the only project that is doubling-down on their antipattern of allowing raw secrets on the web

For Ex. Kyber removed this feature when the community pointed out it was a bad idea

I urge the community to shine the spotlight on any and every project that allows this antipattern - we aren't doing anyone any favours enabling this type of convenience to end users.

@nadertheory I am more than happy to give you data to help you change your mind on this stance
hehe 😇 it all makes sense now

DeSo = ✨ Don't Ever Sign On ✨ Image

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with harry.eth (citizen#19,#100)

harry.eth (citizen#19,#100) Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @sniko_

10 Aug 21
Why have most of us never heard of a protocol that has $600M TVL until it gets hacked? What is this space?!
40 minutes apart...

0x3a09c98f99edd9601ed017ff269652fd80c7e9aedcea57126990031128851043

0x552bc0322d78c5648c5efa21d2daa2d0f14901ad4b15531f1ab5bbe5674de34f ImageImage
~6 hours later, Poly team "reach out" to the hacker

Image
Read 38 tweets
2 Feb 18
Here's a sneakpeek to helping protect people on Twitter from #ethereum scams that have recently become big profit.
Finding soooo many holy shit. Only 7 accounts in this whitelist too :/
And another...
Read 4 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(