Excalibur's Security Model
Excalibur makes the following assumptions when designing the system:
- Assume that an attacker is able to sniff and modify any transmission between client and server1.
- Assume that the server is able to read and modify any files on its system, and assume that all actions performed on the server are logged.
- Assume that the client is free from malware (as otherwise the files can already be ready and modified by an attacker).
The entire design of Excalibur revolves around these three assumptions. Our goal is to design a system that is able to store files that only the user can read and modify2. It turns out that these assumptions are almost identical to those of password managers, just that instead of storing passwords we are storing files. To that end, Excalibur arbitrarily chose to follow 1Password's design because it has a publicly accessible whitepaper detailing how it keeps data secure.