Author Topic: Spectre and Meltdown Vulnerabilities  (Read 30993 times)


  • Newbie
  • *
  • Posts: 1
  • Karma: +0/-0
    • View Profile
Spectre and Meltdown Vulnerabilities
« on: January 04, 2018, 07:54:49 PM »
How do subject vulnerabilities effect encryption in user created applications?


  • Administrator
  • Full Member
  • *****
  • Posts: 103
  • Karma: +7/-0
    • View Profile
Re: Spectre and Meltdown Vulnerabilities
« Reply #1 on: January 12, 2018, 12:30:50 PM »
The answer is that it affects Chilkat no differently than anything else.   Here are two thoughts:
  • Generally, when Chilkat has sensitive data in memory, such as passwords, private keys, etc., they are kept encrypted using a random (internal) session key that is different for each internal object instance.  When the particular thing is needed, such as the password, it is decrypted, used, and then the memory zeroed out.  This is standard practice that existed long before Meltdown was ever discovered.
  • With the discovery of Meltdown, Chilkat recognized that methods exist where passwords are passed in strings, such as to authenticate with a mail server, SSH server, etc.  Even if Chilkat stores the password encrypted in memory once it's received, there is still the issue of the password being clear-text in memory in making the call from application code to Chilkat.  Thus Chilkat is introducing the SecureString class to mitigate that vulnerability.  Here is an example:    The SecureString class will be released in Chilkat v9.5.0.71 in the next few days.   The idea of SecureString is that your app might keep passwords in a database, or in files, perhaps encrypted.  They can be loaded into a SecureString from an encrypted source, and then passed to a newly added Chilkat method that accepts the SecureString.