Marsh Ray wrote:
On 07/15/2011 11:21 PM, Ian Goldberg wrote:

Just to be clear: there are _no_ OTR-related mathematical points or
issues here.  The logs were in plain text.  OTR has nothing at all to do
with their deniability.

It's a good bet the entirety of the informant's PC was acquired for computer forensic analysis, as well as every PC Manning is known to have touched. There's a good chance some traffic data was retained from the network where Manning allegedly did the chatting and data transfer.

Sure the logs we see are in plain text, but that's almost certainly not all the data in play. Deniability may yet still depend on OTR and its implementation.

Note that the logs indicate the parties were unauthenticated and the connection was bouncing. Was this a man-in-the-middle interception? Does the protocol and implementation issue a message to the user when an "unauthenticated" identity changes its key?

- Marsh


I didn't look at the details of this incident/case beyond the discussion on this list.

However, it appears that the two questions in the last paragraph below are sufficiently doubt casting for challenging the electronic evidence as a reliable account of a conversation using electronic means.

Thus, the OTR protocol (including detection of re-keying exchange) would appear to have the indirect result of reporting tampering-in-the-loop. Maybe not as a specific design goal, but as a consequence of cryptographic processing which makes everything more error-prone.

Just my 0.02 cents.

- Thierry Moreau

_______________________________________________
cryptography mailing list
[email protected]
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to