On Fri, 22 Feb 2013 14:36:25 -0300 Sergio Lerner <sergioler...@certimix.com> wrote:
> I was thinking again about my proposal and found that it has a > drawback. Suppose an attacker breaks in a computer that is > communicating with OTR, he can try to guess a plaintext and use it to > check if the encryption is correct. Am I missing something? If the attacker has compromised the computer, do they not have direct access to system memory containing the temporary keys, including the plaintext via keyboard hooks? _______________________________________________ OTR-dev mailing list OTR-dev@lists.cypherpunks.ca http://lists.cypherpunks.ca/mailman/listinfo/otr-dev