That's true, the TextSecure server always knows who the sender and recipient 
are, regardless. Adding Tor to the sender side would only deny the server 
knowledge of the sender's IP address. Thanks to the use of proprietary push 
messaging systems it already lacks the recipient's IP address unless an 
attachment is involved.


As far as spam goes, TextSecure does contact intersection. The server will 
confirm the registration status of many thousands of potential users at a time, 
for any authenticated user. As the address space for phone numbers is small, 
and big chunks of that space can be ruled out with well known telephone 
numbering plans (eg. safe to assume that +1212555xxxx is unused). I believe it 
is currently feasible to accurately enumerate the users on the official 
WhisperSystems server, and then spam them. The only thing preventing this from 
being more than a theoretical problem is the lack of mainstream adoption, and 
thus profit motive.


The server could enforce a lower limit on the number of contacts a client may 
send during a directory sync, but that might break some clients who have 
synched their address books with really well used Exchange or gmail accounts. 
Adding some other form of identifier such as email addresses would help, and 
surely that must happen to support non-telephony devices, but even that doesn't 
make TextSecure any more resistant to spam than email.


Anyway, I think may be getting too off topic here.



________________________________
From: [email protected] <[email protected]> on behalf of Mike Hearn 
<[email protected]>
Sent: Monday, September 22, 2014 5:39 AM
To: Sean Comeau
Cc: Trevor Perrin; messaging
Subject: Re: [messaging] fyi: metadata-eliminating tor-based chat program: 
Ricochet


There is not much point in making this change to any TextSecure client until 
the websocket implementation is completely done on the server. Right now the 
only push mechanisms TextSecure-Server supports won't be easy to use with Tor.

There's no need to replace the push side, I'd think. If the send side is via 
Tor then the receiving side doesn't have to be. After all, even with ring 
signature authentication the TextSecure servers still need to know which 
recipient to route the message to.

Also, I wouldn't say that TextSecure has Pond's anti spam and privacy model at 
all. It could have something similar added, but unless you know something Open 
WhisperSystems hasn't made public, the means that federation might be made open 
are still undefined.

What I meant is, you cannot message someone via TS unless they've given you 
their phone number, which is usually a private-ish sort of credential. So they 
don't have the same complicated anti-spam issues that comes from accepting 
messages from any random person who crawls the web and finds a widely published 
address.
_______________________________________________
Messaging mailing list
[email protected]
https://moderncrypto.org/mailman/listinfo/messaging

Reply via email to