45:49Yeah, so this came out of
when we were with Y-Sweet.
45:52We wanted to do We wanted to have
store the data locally in the
45:56client, at least as an option.
45:58so we looked at the options that
were available or, you know, local
46:01storage, indexed db, opfs, origin,
private file system, realized that
46:06indexed db was really the kind of the
right way to go for this right now.
46:10have high hopes on opfs, but
they're still, I mean, they
46:14all kind of have flaws, but.
46:16Index DB is like the best people
know the flaws the best, I guess,
46:20and how to work around them.
46:21So, looked at index DB.
46:23But the problem that we found with
all of them is that all of them store
46:27the data in plain text, and that's
not just a theoretical problem.
46:32There is at least a couple months ago.
46:34Now, there was some, you know, NPM
and pie pie modules out there that
46:39would read some application data
from these plain text sources.
46:43it's kind of a real problem
that people have identified.
46:46And has been exploited.
46:48so we wanted to make sure that we
provided an option that at least as,
46:51as best as possible would prevent that.
46:54so we said, okay, well,
browsers have web crypto.
46:57We can encrypt all this.
46:58but then there's this problem
of where do you store the key?
47:01because you could start on on the
server, but then kind of defeats
47:04the purpose if you're offline,
of then accessing that data.
47:07So realize that.
47:10don't really have a good way to
store a key kind of credential.
47:16we've got like WebAuthn, but WebAuthn is
a bit more secure, like, which is where
47:21you have pass keys and things like that.
47:23It's a bit more opinionated.
47:24It uses the operating systems key chain,
but it, doesn't really expose that to
47:29you as any sort of low level API that
you can store your own secrets in.
47:34What has started happening is that
some browsers, particularly Chromium
47:37based browsers, Google Chrome, Edge,
Rave, have built in something called
47:44App-Bound encryption, and they're just
using this for cookies, but the idea
47:48is that the browser will store, cookies
in, you know, on disk as they always
47:54have, but they'll be encrypted on disk,
and then the symmetric key to that will
47:59be stored in the, Operating systems
keychain and the operating system is set
48:05up to at least in theory, and there's
been some vulnerabilities here, too.
48:09But, at least in theory, only
give that private key back to
48:14the browser process itself not to
another process that attempts to
48:18impersonate, the browser process.
48:20So what we landed on, which was pretty
surprising to me, that this was kind
48:24of the best available path right now.
48:27But if you enable local storage, we
encrypt it stored in index DB and
48:33then store the key in a cookie and.
48:35Kind of piggyback on that being
App-Bound encrypted in at least
48:39in browsers to support it.
48:41That is very interesting.
48:42Yeah, I've been studying, cryptography,
particularly in a browser context,
48:46also a bit more for various reasons.
48:49I am, trying to see what would
it take to, do the entire, sync.
48:55messages for Livestore, what would it
be, for them to be enter and encrypted,
49:01but the hard part is not the encryption,
but the hard part is the end to end
49:07where, the various ends own their keys.
49:11And there's a, we should do an
entire episode just about that.
49:14what's difficult about it, but,
it can all be distilled down to
49:18the hard part about, anything
cryptography related as key management.
49:23And you can either around the side of like
being a little bit more loose with like
49:27how you manage keys, but that defies a lot
of the, purposes and the benefits here.
49:32but then also the, browser makes that
really, really tricky because it has very
49:38constrained APIs and historically it's
always been rather a web document viewer
49:43than a fully fledged application platform
and, we're getting the building blocks.
49:49I mean, you can, use the, web crypto API.
49:52I'm also using the Libsodium projects,
compiled to WASM, which is very
49:57powerful and gives you a couple.
50:00of advanced, algorithms, et cetera,
that you can use for, symmetric or
50:05asymmetric encryption, signing, et cetera.
50:08and pass keys, I think are also
like, a super important foundation.
50:13But, they also get you just so far.
50:16And I think they don't really help
you for the encryption as such,
50:20but rather for signing messages.
50:23So I think we're still
lacking a few building blocks.
50:25So very excited to hear about this
what, what it was again, App-Bound.
50:31App-Bound encryption, so ideally at some
point, this goes even beyond cookies that,
50:37this can be applied for other storage
mechanisms, but I like the approach
50:41to, basically encrypt it and then you
reduce it to the key management problem
50:46and that you put into a cookie, which
also, there's another question, which is
50:52what happens if that cookie goes away?
50:55did you figure out a, an answer for that?
50:58we don't.
50:58We just set it to a long expiration,
but it's the thinking there was like,
51:02if the user is clearing their cookies
on that tab or on that hosting, they
51:08probably want to destroy the data.
51:10And so are they, you know,
they want to be logged out.
51:13so we actually saw it as the
right thing to do to, bind it.
51:17The other nice thing about that is
like, unlike indexed DB cookies can
51:21actually have an expiration date.
51:22So we could set an expiration of a week.
51:25we're still relying on the browser to
enforce that, but if the browser enforces
51:28that, and then, you know, two weeks later,
that person is fully hacked, including
51:33their operating system key chain, the
browser, at least in theory, will have
51:36deleted that private key and then the
data that's in IndexedDB will be gone.
51:40So that's actually, funny
enough, additional functionality.
51:43It was just incidental to the,
to using cookies for that.
51:46Right.
51:46I like this trick a lot
and I got to look into it.
51:49One thing to point out still is, you've
mentioned that this mechanism is only
51:54available in Chromium browsers anyway,
but, cookies and IndexedDB, OPFS, et
52:00cetera, all of that is available in
other browsers and namely Safari as well.
52:05One thing that, people find out the hard
way about Safari is that it automatically
52:11deletes a user's data after seven days
if they haven't visited that website.
52:16So if you're building a fully
local-first web experience where
52:21someone, creates some precious data,
in Safari and maybe doesn't sync it
52:26yet to somewhere else, go on vacation,
come back and poof, the data is gone.
52:32So I think as app builders, we
need to be aware of that and
52:36detect, Hey, is this Safari?
52:38And in Safari, make this part of the
product experience show sort of like
52:42a message, like, Hey, be careful.
52:44Your data might go away.
52:46There are ways to remedy that.
52:48And, to, for example, if you make
the Safari app, a, progressive web
52:53app by adding it to the home screen.
52:56That limitation goes away.
52:58but app builders need to be aware that
they can make the app users aware.
53:04it's just something that, I
think is important to, note.
53:08Yeah, I think that's an example
of a number of cases where the
53:11browsers are just not optimized for
local-first apps, unfortunately.
53:15you know, the, I think the ability to just
store low level access to the operating
53:21systems key chain is another, where.
53:23Browsers have improved a ton in terms
of what they expose of the APIs, but I
53:28think they're still lagging when it comes
to that storage and encrypted storage.
53:32Yeah, totally.
53:34So, maybe slightly, moving to
another browser related topic.
53:39you've been both through your
work, Through your prior role, and
53:43also as part of Jamsocket, you've
been dealing with quite a bit