mirror of
https://github.com/PrivSec-dev/privsec.dev
synced 2025-02-20 18:31:35 -05:00
Update index.md
updated Powerwash typo Signed-off-by: Aryun Gupta <38221566+AryunGupta@users.noreply.github.com>
This commit is contained in:
parent
252b7db855
commit
68a10c0f4e
@ -27,12 +27,12 @@ As a result, someone with sufficient access to Google's servers would theoretica
|
||||
|
||||
This differs from how encryption passwords are handled by other services like cloud‑based password managers — they use _client‑side hashing_ to deliberately blind the server from the actual password. As the name suggests, the browser locally executes a cryptographic hash function on the actual password and only transmits the _resultant hash_ to the server for authentication.
|
||||
|
||||
The user should be able to avoid this issue with the local password. While we have not done in-depth analysis to confirm that Google never has access to the local encryption password, this is likely the case since an account recovery using the Google password will require a Power Wash:
|
||||
The user should be able to avoid this issue with the local password. While we have not done in-depth analysis to confirm that Google never has access to the local encryption password, this is likely the case since an account recovery using the Google password will require a Powerwash:
|
||||
|
||||

|
||||

|
||||
|
||||
## Takeaways
|
||||
|
||||
If Google is malicious, coerced by the government, or hacked, their servers can record the user password prior to it being hashed server‑side. That password can then be used by an adversary with physical access to unlock ChromeOS and gain access to the data stored therein, if the Google account password is used for encryption.
|
||||
|
||||
As a result, when setting up your Chromebook, it is highly recommended that you use a local password instead.
|
||||
As a result, when setting up your Chromebook, it is highly recommended that you use a local password instead.
|
||||
|
Loading…
Reference in New Issue
Block a user