| ▲ | ec109685 a day ago |
| There are API’s that chrome provides that allows servers to validate whether the request came from an official chrome browser. That would detect that this curl isn’t really chrome. It’d be nice if something could support curl’s arguments but drive an actual headless chrome browser. |
|
| ▲ | darrenf a day ago | parent | next [-] |
| Are you referring to the Web Environment Integrity[0] stuff, or something else? 'cos WEI was abandoned in late 2023. [0] https://github.com/explainers-by-googlers/Web-Environment-In... |
|
| ▲ | do_not_redeem a day ago | parent | prev | next [-] |
| Siblings are being more charitable about this, but I just don't think what you're suggesting is even possible. An HTTP client sends a request. The server sends a response. The request and response are made of bytes. Any bytes Chrome can send, curl-impersonate could also send. Chromium is open source. If there was some super secret handshake, anyone could copy that code to curl-impersonate. And if it's only in closed-source Chrome, someone will disassemble it and copy it over anyway. |
| |
| ▲ | gruez a day ago | parent | next [-] | | >Chromium is open source. If there was some super secret handshake, anyone could copy that code to curl-impersonate. And if it's only in closed-source Chrome, someone will disassemble it and copy it over anyway. Not if the "super secret handshake" is based on hardware-backed attestation. | | |
| ▲ | do_not_redeem a day ago | parent [-] | | True, but beside the point. GP claims the API can detect the official chrome browser, and the official chrome browser runs fine without attestation. |
| |
| ▲ | dist-epoch a day ago | parent | prev [-] | | > someone will disassemble it and copy it over anyway. Not if Chrome uses homomorphic encryption to sign a challange. It's doable today. But then you could run a real Chrome and forward the request to it. | | |
| ▲ | do_not_redeem a day ago | parent [-] | | No, even homomorphic encryption wouldn't help. It doesn't matter how complicated the operation is, if you have a copy of the Chrome binary, you can observe what CPU instructions it uses to sign the challenge, and replicate the operations yourself. Proxying to a real Chrome is the most blunt approach, but there's nothing stopping you from disassembling the binary and copying the code to run in your own process, independent of Chrome. | | |
| ▲ | dist-epoch a day ago | parent [-] | | > you can observe what CPU instructions it uses to sign the challenge, and replicate the operations yourself. No you can't, that's the whole thing with homomorphic encryption. Ask GPT to explain it to you why it's so. You have no way of knowing the bounds of the code I will access from the inside the homomorphic code. Depending on the challenge I can query parts of the binary and hash that in the response. So you will need to replicate the whole binary. Similar techniques are already used today by various copy-protection/anti-cheat game protectors. Most of them remain unbroken. | | |
| ▲ | do_not_redeem a day ago | parent | next [-] | | You're just describing ordinary challenge-response. That has nothing to do with homomorphic encryption and there are plenty of examples from before homomorphic encryption became viable, for example https://www.geoffchappell.com/notes/security/aim/index.htm Homomorphic encryption hides data, not computation. If you've been trying to learn compsci from GPT, you might have fallen victim to hallucinations. I'd recommend starting from wikipedia instead. https://en.wikipedia.org/wiki/Homomorphic_encryption And btw most games are cracked within a week of release. You have way too much faith in buzzwords and way too little faith in bored Eastern European teenagers. | | |
| ▲ | dist-epoch 15 hours ago | parent [-] | | > Homomorphic encryption hides data, not computation Data is computation. x = challenge_byte ^ secret_key
if x > 64:
y = hash_memory_range()
else:
y = something_else()
return sign(y, secret_key)
| | |
| ▲ | do_not_redeem 3 hours ago | parent [-] | | That snippet has nothing to do with homomorphic encryption. It's just the same kind of challenge-response AIM and many others were already doing in the 90s. You seem convinced that homomorphic encryption is some kind of magic that prevents someone from observing their own hardware, or from running Chrome under a debugger. That's just not true. And I suspect we don't share enough of a common vocabulary to have a productive discussion, so I'll end it here. |
|
| |
| ▲ | fc417fc802 a day ago | parent | prev [-] | | I don't believe this is correct. Homomorphic encryption enables computation on encrypted data without needing to decrypt it. You can't use the result of that computation without first decrypting it though. And you can't decrypt it without the key. So what you describe regarding memory addresses is merely garden variety obfuscation. Unmasking an obfuscated set of allowable address ranges for hashing given an arbitrary binary is certainly a difficult problem. However as you point out it is easily sidestepped. You are also mistaken about anti-cheat measures. The ones that pose the most difficulty primarily rely on kernel mode drivers. Even then, without hardware attestation it's "just" an obfuscation effort that raises the bar to make breaking it more time consuming. What you're actually witnessing there is that if a sufficient amount of effort is invested in obfuscation and those efforts carried out continuously in order to regularly change the obfuscation then you can outstrip the ability of the other party to keep up with you. |
|
|
|
|
|
| ▲ | binarymax a day ago | parent | prev | next [-] |
| I’m interested in learning more about this. Are these APIs documented anywhere and are there server side implementation examples that you know of? EDIT: this is the closest I could find. https://developers.google.com/chrome/verified-access/overvie... ...but it's not generic enough to lead me to the declaration you made. |
| |
|
| ▲ | bowmessage a day ago | parent | prev [-] |
| There’s no way this couldn’t be replicated by a special build of curl. |