JavaScript Crypto Security
Cluster focuses on debates about implementing cryptography in JavaScript, including concerns over JS-based crypto libraries like crypto-js, recommendations for WebCrypto API and libsodium, and warnings against rolling your own crypto.
Activity Over Time
Top Contributors
Keywords
Sample Comments
you are right, this falls back in "normal" crypto-as-js security considerations.
What's the state of WebCrypto APIs, and is it already possible to avoid ciphers written and deployed in JS?
Whatever happened to "don't roll your own crypto"? Isn't this work best left to OpenSSL for example.
Why not use WebCrypto instead? No library needed.
Great reference! Do you know of a WebCrypto based implementation of this? Or even libsodium? That has been my hold back.
What is the major difference? Isn't crypto-js still secure?
One of the reasons JavaScript crypto is a bad idea in most cases.
Libsodium you mean. Has safe cutting edge crypto, and nothing else.
Native cryptography, I'd say
Out of interest, if you're going to go off-standard, why not just use libsodium and get decent crypto?