348
edits
m (→In Detail) |
mNo edit summary |
||
Line 16: | Line 16: | ||
So, if somebody were able to get your username and password, all they could get is your encrypted data records. They would then need to know your passphrase to decrypt your data. Now, getting access to the encrypted data could enable certain kinds of analysis, so it's important to keep your password safe, but the passphrase is the really important key. | So, if somebody were able to get your username and password, all they could get is your encrypted data records. They would then need to know your passphrase to decrypt your data. Now, getting access to the encrypted data could enable certain kinds of analysis, so it's important to keep your password safe, but the passphrase is the really important key. | ||
None of this removes the need for good personal computer security, of course! We strongly recommend that you enable a Master Password for your Firefox, which causes your passwords and form history to be encrypted; this will protect you if your computer is stolen or is infected with a trojan. We also strongly recommand that you only run addons from trusted sources, as Firefox addons have broad access to sensitive data through internal APIs. If you're interested in our efforts to create a more secure internal API for addons, please check out the [http://mozillalabs.com/Jetpack Jetpack] project. | None of this removes the need for good personal computer security, of course! We strongly recommend that you enable a Master Password for your Firefox, which causes your passwords and form history to be encrypted; this will protect you if your computer is stolen or is infected with a trojan. We also strongly recommand that you only run addons from trusted sources, as Firefox addons have broad access to sensitive data through internal APIs. If you're interested in our efforts to create a more secure internal API for addons, please check out the [http://mozillalabs.com/Jetpack/ Jetpack] project. | ||
If you are a developer, you can get a detailed explanation of the cryptographic processes used in Weave on the [[Labs/Weave/Developer/Crypto|Developer Crypto]] page. | If you are a developer, you can get a detailed explanation of the cryptographic processes used in Weave on the [[Labs/Weave/Developer/Crypto|Developer Crypto]] page. |
edits