On Mon, 2015-10-12 at 08:17 -0700, Sarah Jamie Lewis wrote: > > In any case, I'm interested in more solutions to the presense > > problem for Ricochet because it's really annoying me! > > This is something I've been thinking about lately. > > I believe the only way this could work given the Ricochet threat > model is to use multiple identities.
TorChat had that problem as it used both parties hidden services for one chat session, thereby also divulging an isomorphic copy of the social graph to HSDirs. I think Ricochet improves upon this by only opening one connection in the direction of first communication, so George's proposed modification should work fine. In fact, the approach many take for Jabber is to leave themselves logged in all the time from some server. I've seen at least one person do this from Ricochet, not 100% sure how, maybe s/he just makes a tor hidden service that pipes to a text file. We should mention that, at present, Ricochet has no additional encryption beyond Tor's rather anemic 1024 bit RSA. I'd considered hacking in an Axolotl ratchet, but thus far I've been rather busy. It'd be better to do it sooner rather than later. Jeff
signature.asc
Description: This is a digitally signed message part
_______________________________________________ Messaging mailing list [email protected] https://moderncrypto.org/mailman/listinfo/messaging
