▲ | do_not_redeem a day ago | |||||||||||||||||||||||||||||||
No, even homomorphic encryption wouldn't help. It doesn't matter how complicated the operation is, if you have a copy of the Chrome binary, you can observe what CPU instructions it uses to sign the challenge, and replicate the operations yourself. Proxying to a real Chrome is the most blunt approach, but there's nothing stopping you from disassembling the binary and copying the code to run in your own process, independent of Chrome. | ||||||||||||||||||||||||||||||||
▲ | dist-epoch a day ago | parent [-] | |||||||||||||||||||||||||||||||
> you can observe what CPU instructions it uses to sign the challenge, and replicate the operations yourself. No you can't, that's the whole thing with homomorphic encryption. Ask GPT to explain it to you why it's so. You have no way of knowing the bounds of the code I will access from the inside the homomorphic code. Depending on the challenge I can query parts of the binary and hash that in the response. So you will need to replicate the whole binary. Similar techniques are already used today by various copy-protection/anti-cheat game protectors. Most of them remain unbroken. | ||||||||||||||||||||||||||||||||
|