-
Notifications
You must be signed in to change notification settings - Fork 43
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Tor & Encryption #12
Comments
Most of this stuff is iOS-specific. The Airbitz wallet core runs on iOS, Android, and desktop *nix, so we can't use any ObjectiveC or Apple-specific technologies in there. The Airbitz wallet talks to three different types of servers. The login server has an HTTP/REST interface, and handles username lookup on first login, as well as checking the PIN on each PIN login, handling 2fa, and a few other chores like that. This server is zero-knowledge, meaning it doesn't actually know the username, PIN, or any other personally-identifiable data, just hashes. If the server goes down, users can still access their wallets locally via password login. Airbitz connects to the Bitcoin network via libbitcoin servers. These servers use a ZeroMQ-based interface, and the libbitcoin project has efforts underway to enable Tor for these connections. If/when that work comes to fruition, we will most likely adopt it. Airbitz also uses Git servers to sync files between devices. We use the HTTPS transport currently. The libbitcoin idea for Tor is to run ZeroMQ over a SOCKS proxy, which then provides the Tor routing. This works great on Android, where the Tor client can literally be a separate process. On iOS we will have to host the Tor client inside our app's main process, but this shouldn't be too much work (just rename their We encrypt all our own data using AES256. We don't write anything to disk without encryption, aside from a few device-only files. These files are synced between devices using Git, as mentioned earlier. The username and password, when combined with salts stored on the login server, derive the first-level encryption keys for this data. These first-level keys then unlock the second-level keys, which unlock the data itself. This way, we can change the username and password without re-encrypting everything - we just need to re-encrypt the second-level keys. The second-level keys can also be unlocked using the PIN. |
Thanks for the response. Sorry for the late reply. |
Hi, I am cross-posting about two things previously shared with Breadwallet & ArcBit.
First, has there been any work or thinking done on Tor for Airbitz (iOS)? I've noticed a Tor implementation by a single app on iOS (ChatSecure), which allegedly supports Tor right now.
ChatSecure, as of version 3.0 on Jan. 5, 2015, has had Tor support. See here:
https://chatsecure.org/blog/chatsecure-ios-v3-released/
Relevant links:
https://github.com/chatsecure/onionkit
https://github.com/ChatSecure/Tor.framework
https://github.com/ursachec/CPAProxy
https://github.com/ChatSecure/CPAProxy
Downsides of Tor support in ArcBit:
Second, on another note, how does Airbitz encrypt its data, if at all, or does it only rely on iPhone's encrypted storage?
I ask because of ChatSecure's notes on 'encrypted storage', where they say:
"all content is locally encrypted in a SQLCipher database"
Can, or should, the same approach be used to 'better' encrypt Airbitz data on iOS?
The text was updated successfully, but these errors were encountered: