▲ | dist-epoch a day ago | ||||||||||||||||||||||||||||||||||||||||
> someone will disassemble it and copy it over anyway. Not if Chrome uses homomorphic encryption to sign a challange. It's doable today. But then you could run a real Chrome and forward the request to it. | |||||||||||||||||||||||||||||||||||||||||
▲ | do_not_redeem a day ago | parent [-] | ||||||||||||||||||||||||||||||||||||||||
No, even homomorphic encryption wouldn't help. It doesn't matter how complicated the operation is, if you have a copy of the Chrome binary, you can observe what CPU instructions it uses to sign the challenge, and replicate the operations yourself. Proxying to a real Chrome is the most blunt approach, but there's nothing stopping you from disassembling the binary and copying the code to run in your own process, independent of Chrome. | |||||||||||||||||||||||||||||||||||||||||
|