On Sat, Jan 18, 2014 at 12:16:45PM -0800, gwen hastings wrote: > we should just stop using loaded language like "NSA Proof" and resting > on past laurels to assure folks that such is a fact(it isn't).
proof implies 100% security. eh? we all know that that's a unicorn. > gh(who is now finally picking up the python language in a serious > way) <3 hell yeah, it sometimes pays to be grumpy. > next will be taking pbp routines and formats and creating a new > curvep25519 version of type 1 and type 2 remailers with a nym.alias.net > clone in python using Curvep25519 keys to emulate a type 1 reply > block(have to see what mixminion does for reply-blocks if any) fantastic. just 2 days ago i hacked an AMM together using pbp. https://www.ctrlc.hu/~stef/amm.py - proper release coming soon. should be hosted on an .onion address. > ps2ps: PCP and PBP developers need to make up their collective heads > about external representation key formats for public keys(I will be > using pbp as its already in python) we are off-list in fruitful contact. > I am kind of dependent on these(key format representations) pbp is still kinda experimental. but the more users and the more feedback on key-formats and related stuff gets us faster to stability. nb: your pgp key is kinda huge due to the embedded jpg of yours, which is kinda contra-productive, it does not allow visual recognition, but leaks side-chan information that could be used against you. -- pgp: https://www.ctrlc.hu/~stef/stef.gpg pgp fp: FD52 DABD 5224 7F9C 63C6 3C12 FC97 D29F CA05 57EF otr fp: https://www.ctrlc.hu/~stef/otr.txt
