Hi, I have updated my proposal to melange. It would be great if mentors can have a look and give feedback to improve it further before deadline.
On Sun, Apr 28, 2013 at 12:40 AM, Sukhbir Singh <[email protected]>wrote: > Hi Hareesan, > > > : Exif.Photo.ImageUniqueID or Exif.Image.DateTime, etc ). If its a fixed > > location and if the man-in-middle know that location,and if he know Bob's > > public key (since its public), he could easily get to the message. If > MIAB > > Alice will use Bob's public key to encrypt the message, so the message > can be read by Bob and no one else, as only he has the corresponding > private key. > > > going to select the location arbitrarily, how it could be transferred to > > Bob's MIAB client? > > While MIAB proposes the use of blog pings (see section 3.1.1 of the > paper) to distribute the messages and a MIAB client to embed them, our > idea for this project is to come up with a similar system, but one that > will allow: a). embedding secrets (like in our case, bridge addresses) > in a website(s), b). detecting these secrets when a user navigates to them. > > So, while theoretically what we aim to do is similar to MIAB, the > practical implementation will be different and coming up with that > design will constitute the main part of your application. > > -- > Sukhbir > _______________________________________________ > tor-dev mailing list > [email protected] > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev > -- *Hareesan R Undergraduate Department of Computer Science And Engineering University Of Morat**uwa Sri Lanka**** *
_______________________________________________ tor-dev mailing list [email protected] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
