Commit Graph

155 Commits

Author SHA1 Message Date
lockbitchat
2306b32482 Remove experimental Bluetooth key transfer module
- Deleted BluetoothKeyTransfer.js and related classes
- Removed BluetoothKeyTransfer.jsx UI component
- Cleaned up Bluetooth imports from app-boot.js and bootstrap-modules.js
- Removed Bluetooth buttons and handlers from main app
- Eliminated all Bluetooth functionality due to Web Bluetooth API limitations
- Browsers cannot create GATT servers or advertise devices
- Reduced bundle size by ~78KB
- Application now focuses on supported browser technologies (QR codes, manual key exchange, WebRTC)
2025-10-15 01:47:28 -04:00
lockbitchat
cbb6a8fa31 Remove experimental Bluetooth key transfer module
- Deleted BluetoothKeyTransfer.js and related classes
- Removed BluetoothKeyTransfer.jsx UI component
- Cleaned up Bluetooth imports from app-boot.js and bootstrap-modules.js
- Removed Bluetooth buttons and handlers from main app
- Eliminated all Bluetooth functionality due to Web Bluetooth API limitations
- Browsers cannot create GATT servers or advertise devices
- Reduced bundle size by ~78KB
- Application now focuses on supported browser technologies (QR codes, manual key exchange, WebRTC)
2025-10-15 01:46:54 -04:00
lockbitchat
4be6fc55f5 Remove experimental Bluetooth key transfer module
- Deleted BluetoothKeyTransfer.js and related classes
- Removed BluetoothKeyTransfer.jsx UI component
- Cleaned up Bluetooth imports from app-boot.js and bootstrap-modules.js
- Removed Bluetooth buttons and handlers from main app
- Eliminated all Bluetooth functionality due to Web Bluetooth API limitations
- Browsers cannot create GATT servers or advertise devices
- Reduced bundle size by ~78KB
- Application now focuses on supported browser technologies (QR codes, manual key exchange, WebRTC)
2025-10-15 01:46:36 -04:00
lockbitchat
cb62d8eb3b fix: resolve ReferenceError issues and improve disconnect functionality
- Add missing sessionTimeLeft state variable to fix ReferenceError in handleDisconnect
- Fix ReferenceError in handleCreateAnswer by correcting variable scope (e.target.value -> answerInput)
- Add type checking for answerData.trim() to prevent TypeError in shouldPreserveAnswerData
- Standardize data types by replacing null assignments with empty strings for offerData/answerData
- Improve handleDisconnect function with proper error handling and comprehensive state cleanup
- Add try-catch wrapper around disconnect operations for better error handling
- Ensure complete metadata removal and connection termination on disconnect
- Fix Bluetooth transfer modal opening with proper role-based event dispatching
2025-10-14 22:51:48 -04:00
lockbitchat
ea8cf47118 Table update 2025-10-13 11:54:05 -04:00
lockbitchat
d292c84829 session bug fix 2025-10-13 11:13:11 -04:00
lockbitchat
45de8ce285 refactor: implement minimal PWA caching strategy
- Cache only essential PWA assets (manifest, icons, core scripts)
- Use Network First for all other requests
- Remove aggressive caching of UI components and styles
- Preserve PWA installation while minimizing cache footprint
2025-10-13 01:38:41 -04:00
lockbitchat
7af8f528ff refactor: implement minimal PWA caching strategy
- Cache only essential PWA assets (manifest, icons, core scripts)
- Use Network First for all other requests
- Remove aggressive caching of UI components and styles
- Preserve PWA installation while minimizing cache footprint
2025-10-13 01:35:32 -04:00
lockbitchat
d24d578321 feat: Add comprehensive iOS PWA splash screen support
- Add complete splash screen configuration for all iOS devices
- Support iPhone 17 Pro Max through iPhone 6 series
- Support all iPad models with landscape/portrait orientations
- Use proper media queries and generated splash images
- Fix iOS splash screen caching and display issues
2025-10-09 20:49:04 -04:00
lockbitchat
dd9f13ab59 Add Browser Extension block 2025-10-09 05:09:17 -04:00
lockbitchat
2e5b078bc2 UX/UI updates and bug fixes 2025-10-08 17:23:54 -04:00
lockbitchat
75fa1cd27d Qr generator create bug fix 2025-10-08 01:24:04 -04:00
lockbitchat
60db79d2ae v4.3.120 update 2025-10-08 00:17:53 -04:00
lockbitchat
204e1edd9a Update version to 4.3.120 UX/UI 4.3.120 2025-10-08 00:08:13 -04:00
lockbitchat
5b557102b4 Fix QR scanner multi-chunk processing and binary data handling
- Fix duplicate chunk detection by using data hash instead of index
- Add comprehensive logging for QR scanner debugging
- Implement proper buffer cleanup when scanner is closed
- Preserve original binary data instead of decoding to JSON
- Add deduplication logic to prevent same QR code being processed multiple times
- Improve error handling and scanner state management
- Fix binary chunk reconstruction to maintain SB1:bin: prefix format
2025-10-07 23:58:54 -04:00
lockbitchat
e6d6576d70 Render loading state if not ready 2025-10-06 14:35:13 -04:00
lockbitchat
d2830b9c46 Optimize JSON and QR codes
- Replaced original JSON with minimized binary format (gzip + base64).
- Adjusted rendering and QR code generation for compatibility.
- Reduced payload size for improved efficiency.
2025-10-05 06:21:14 -04:00
lockbitchat
ec04bebf22 Update UX/UI slider 2025-10-03 00:07:11 -04:00
lockbitchat
8cd78a2aba Update slider UX/UI 2025-10-02 21:34:45 -04:00
lockbitchat
4359e5fab1 Add Testimonials section with user feedback 2025-10-02 19:39:40 -04:00
lockbitchat
78769b58ef UX/UI update 2025-10-02 16:58:09 -04:00
lockbitchat
afc873761f update 2025-10-02 16:52:42 -04:00
lockbitchat
7682f57889 feat(ui): add glowing border effect and improve card hover interactions
- implemented glowing border effect on cards when cursor is near
- multiple cards can glow simultaneously within proximity
- smooth fade-out without flicker on mouse leave
- improved hover animation for better user experience
2025-10-02 16:52:31 -04:00
lockbitchat
6bed472e09 feat(security): implement core crypto and logging hardening
- removed all logging of raw IV, JWK, session tokens, verification codes
  → logs now only include error codes, timestamps and short non-reversible SHA-256 hashes (first 4 bytes)
- replaced global master key storage with PBKDF2-derived non-extractable AES key
  → master key lives only in session memory and is cleared on timeout/focus-out
- added password-based derivation (PBKDF2) for master key initialization
- migrated persistent key storage to AES-GCM wrapped ciphertext in IndexedDB
  → JWK export → encrypt with session master key → store ciphertext + IV + metadata
  → unwrap + import as non-extractable on restore
- removed busy-wait loops and direct `window.gc()` calls
  → replaced with async non-blocking cleanup via setTimeout/Promise/WebWorker
2025-10-02 03:25:38 -04:00
lockbitchat
65cc136b99 chore: remove debug logging and disable debug mode for production
- Removed temporary console logs used for debugging
- Disabled DEBUG_MODE flag
- Updated configuration to run in production mode
- Cleaned up leftover debug utilities to reduce noise in console
2025-10-02 01:43:32 -04:00
lockbitchat
5ce6db1640 update 2025-10-01 23:27:59 -04:00
lockbitchat
0dde4906d9 update UX/UI 2025-10-01 23:26:07 -04:00
lockbitchat
0a7a830b52 Update UX/UI landing page 2025-10-01 20:20:15 -04:00
lockbitchat
49347b5c78 Uopdated version to v4.2.12 - ECDH + DTLS + SAS 4.2.12 2025-09-30 14:18:01 -04:00
lockbitchat
85d900727d Update v4.2.12 2025-09-30 14:13:23 -04:00
lockbitchat
7902359c48 feat(qr-exchange): improved QR code exchange system
- Updated connection flow between users via QR codes
- Added manual switching option in QR code generator
- Increased number of QR codes for better readability
2025-09-27 19:07:17 -04:00
lockbitchat
0ce05b836b Update delete old laying visual files 2025-09-24 10:48:32 -04:00
lockbitchat
34094956b7 feat(core): update session, security system and QR exchange
- Removed session creation and Lightning payment logic
- Refactored security system:
  * no more restrictions
  * all systems enabled on session creation
- Improved QR code exchange for mobile devices
2025-09-23 20:01:02 -04:00
lockbitchat
804b384271 feat: implement build system and development workflow
- Add npm scripts for CSS/JS compilation (build:css, build:js, build)
- Create PowerShell build automation script
- Document development workflow in README
- Add troubleshooting guide for build issues
- Specify proper file structure and compilation process

Supports Tailwind CSS v3.4.0 and esbuild bundling with source maps.
2025-09-08 19:22:50 -04:00
lockbitchat
5034386ee6 Update 2025-09-08 16:40:39 -04:00
lockbitchat
14b6ae2337 Add to CSP
report-uri /csp-report;
report-to csp-endpoint;">
2025-09-08 16:10:26 -04:00
lockbitchat
0f8399ec88 feat(security,ui): self-host React deps, Tailwind, fonts; strict CSP; local QR; better selection state
Replace CDN React/ReactDOM/Babel with local libs; remove Babel and inline scripts
Build Tailwind locally, add safelist; switch to assets/tailwind.css
Self-host Font Awesome and Inter (CSS + woff2); remove external font CDNs
Implement strict CSP (no unsafe-inline/eval; scripts/styles/fonts from self)
Extract inline handlers; move PWA scripts to external files
Add local QR code generation (qrcode lib) and remove api.qrserver.com
Improve SessionTypeSelector visual selection (highlighted background and ring)
Keep PWA working with service worker and offline assets
Refs: CSP hardening, offline-first, no external dependencies
2025-09-08 16:04:58 -04:00
lockbitchat
3458270477 deleting unnecessary comments 2025-09-08 11:45:32 -04:00
lockbitchat
e2316f6557 **What Changed:**
- **Removed:** All libsodium dependencies and PAKE-based authentication
- **Replaced With:** ECDH + DTLS + SAS triple-layer security system
- **Impact:** Eliminates complex PAKE implementation in favor of standardized protocols

**Security Benefits:**
-  **Simplified Architecture** - Reduced attack surface
-  **Standards Compliance** - RFC-compliant protocols
-  **Better Maintenance** - Native Web Crypto API usage
-  **Enhanced Security** - Triple-layer defense system

**New Features:**
- **Elliptic Curve Diffie-Hellman** using P-384 (secp384r1)
- **Cryptographically secure** key pair generation
- **Perfect Forward Secrecy** with session-specific keys
- **MITM resistance** requiring knowledge of both private keys
4.02.985
2025-09-04 17:25:01 -04:00
lockbitchat
0d029f5d39 delet test_method 2025-09-01 17:14:16 -04:00
lockbitchat
beb5bcfd01 fix: resolve message sending - _createMessageAAD method not found
- Move methods to constructor for early availability
- Add connectionId initialization
- Remove duplicate definitions
- Fix AAD creation for anti-replay protection
2025-09-01 17:14:04 -04:00
lockbitchat
77c19c4d71 CRITICAL: Fix major security vulnerabilities
- Remove forced session verification bypass (MITM)
- Implement mandatory file message encryption with AAD
- Add DTLS fingerprint validation and SDP parsing
- Implement hard security gate for unverified connections
- Add emergency key wipe on security breaches
2025-09-01 16:04:33 -04:00
lockbitchat
a04fc16d58 Security Update 2025-09-01 15:15:42 -04:00
lockbitchat
14b001710a feat(security): strengthen crypto, entropy checks, and memory cleanup
- Added constant-time key validation to prevent timing attacks
- Improved randomization (crypto.getRandomValues, larger noise patterns)
- Optimized IV cleanup with batch processing and shorter lifetime
- Added multi-dimensional entropy analysis with quantum-resistant checks
- Enhanced emergency cleanup with atomic operations and rollback
2025-08-31 19:37:26 -04:00
lockbitchat
35d83d46f2 feat(security): Implement input validation and fix logging conflicts
- Added comprehensive input validation with size/rate limits
- Fixed logging conflicts by renaming _sanitizeString → _sanitizeInputString
- Implemented XSS/injection protection via pattern detection
- Added safe logging recovery mechanism
- Maintained all existing security protections
2025-08-31 18:35:31 -04:00
lockbitchat
6c4d0eeaee feat(security): harden API export, remove global flags, unify scheduler
- Removed reliance on window.DEBUG_MODE and window.DISABLE_* flags.
- Configuration is now passed via constructor instead of global variables.
- Exposed API remains on `window.secureBitChat`, but without backup globals or hidden toggles.
- Consolidated multiple setInterval tasks into a single scheduler to reduce attack surface.
- Added strict limits for IV history and log storage to prevent memory exhaustion.
- Improved XSS hardening: no more global switches to disable security features.
2025-08-31 18:01:46 -04:00
lockbitchat
39ae9f01b7 feat: comprehensive security fixes for critical vulnerabilities
BREAKING CHANGES:
- Enhanced logging system with comprehensive data sanitization
- Atomic key generation with race condition protection
- Strengthened mutex system implementation
- Complete IV reuse prevention system
- Secured global API with multi-layer protection
- Enhanced memory management with secure wiping
- Improved error handling without information disclosure

Security Fixes:
• CRITICAL: Fix logging system data leakage
  - Add comprehensive pattern detection (hex, base64, base58, base32)
  - Implement entropy-based sensitive data detection
  - Add suspicious character distribution analysis
  - Emergency disable logging on security violations
  - Reduce production logging to errors only

• CRITICAL: Resolve race conditions in key generation
  - Implement atomic state checks within mutex protection
  - Add proper waiting mechanism for concurrent operations
  - Validate key generation results before assignment
  - Add operation timeouts and error recovery

• HIGH: Strengthen mutex system implementation
  - Replace silent failures with proper error propagation
  - Add comprehensive mutex system validation
  - Implement authorized emergency unlock mechanisms
  - Enhanced timeout handling with state consistency
  - Add mutex diagnostics and recovery systems

• HIGH: Complete IV reuse prevention system
  - Implement comprehensive IV collision detection
  - Add entropy validation for generated IVs
  - Track IV usage across sessions with cleanup
  - Detect suspicious patterns and weak RNG
  - Emergency mode activation on security violations

• HIGH: Secure global API exposure
  - Multi-layer protection with Proxy-based access control
  - Block internal property access attempts
  - Implement API replacement monitoring and restoration
  - Add method interception protection
  - Comprehensive global namespace monitoring

• HIGH: Enhanced memory management
  - Implement secure memory wiping for all data types
  - Multiple overwrite passes (random, zeros, ones)
  - Secure cleanup of cryptographic materials
  - Force garbage collection where available
  - Track and validate memory cleanup operations

• HIGH: Improve error handling security
  - Categorize errors by security sensitivity
  - Generate safe error messages without internal details
  - Track error frequency for security monitoring
  - Implement secure error message mapping

Additional Security Enhancements:
• Add DTLS ClientHello race condition protection
• Implement enhanced SecureKeyStorage with encryption
• Add comprehensive IV tracking and validation systems
• Create emergency mode systems for security violations
• Enhance cryptographic validation and state management
• Add extensive security diagnostics and monitoring

Performance & Reliability:
• Optimize mutex usage to reduce contention
• Improve error recovery mechanisms
• Add comprehensive system validation
• Enhanced debugging and diagnostic capabilities
• Better resource cleanup and management
2025-08-31 15:52:34 -04:00
lockbitchat
551feb21a4 Security hardening: remove global leaks, enforce crypto, cleanup logs
- Removed unsafe exposure of internal objects:
      • deleted all references to `window.fileTransferSystem`
      • unified global API setup to a single immutable `safeGlobalAPI` via Object.freeze
      • removed legacy branch with `delete window[name]`

    - Logging improvements:
      • eliminated all direct `console.*` calls (use `_secureLog` exclusively)
      • fixed string templates with proper interpolation (``${var}``)
      • prevented accidental fallback to raw console in production

    - Cryptography enforcement:
      • updated `_validateCryptographicSecurity()` to require ECDSA and PFS
      • added emergency shutdown if critical crypto features are missing
      • ensured consistent feature enabling for production
2025-08-28 18:53:16 -04:00
lockbitchat
a265209ff6 fix(security): fixes in keystore and cryptography
- Metadata of extracted keys is now marked encrypted: true
- Removed decryption bypass via _keyReferences, all keys are returned via decrypt
- Nested encryption uses random 96-bit IV instead of single byte increment
- Fixed _secureLogShim: correct argument destructuring (...args)
- Removed busy-wait in forceInitializeFileTransfer, replaced with async wait
2025-08-28 17:01:14 -04:00
lockbitchat
97b87828e2 feat(security): encrypted key storage with WeakMap and SecureKeyStorage
- Added SecureKeyStorage class: JWK storage encrypted (AES-GCM) + WeakMap
- Support for non-extractable keys via secure links without export
- Implemented secure wipe/secure wipe all, statistics collection
- Improved secure logging: blacklist of sensitive fields, whitelist of secure ones
- Integration with WebRTC manager layers and secure key installation
2025-08-28 16:17:40 -04:00