Hey, I left some comments on the video, I am not a Tor developer but I think I made some valid points, please respond to them
Thanks and Regards On Wed, Dec 2, 2020 at 4:10 PM Wisdom With Rahul <rahulbhatia...@gmail.com> wrote: > This idea is interesting but who owns all the keys? > > Thanks and regards! > > > > > On Fri 13 Nov, 2020, 6:49 AM Keifer Bly, <keifer....@gmail.com> wrote: > >> Well, the mechanism is that it overwrites the key ever time, so each >> message has its own unique key, also the receiver needs to verify the key >> file with the built in tool to be able to use it. So an attacker does not >> know this the only way to get this information is from the person that >> created the message as the need when the OS originally generated the >> message, not when it was uploaded as an attachment somewhere. That's what I >> was thinking. I will look into the communities suggested, thanks very much. >> --Keifer >> >> >> On Thu, Nov 12, 2020 at 1:27 PM Santiago Torres-Arias < >> santi...@archlinux.org> wrote: >> >>> On Thu, Nov 12, 2020 at 11:19:44AM -0800, Keifer Bly wrote: >>> > Hi there, >>> >>> Hello, >>> >>> > So I have a new email encryption system which requires that the user >>> has >>> > the specific key file generated for a message rather than the password, >>> > specifically this software generates a unique key file for a specific >>> > message every time a message is created. The user then enters the date >>> and >>> > time the message was created. Without the original key file the message >>> > can't be opened; >>> > >>> > https://www.youtube.com/watch?v=R0W7OVdNrOA >>> > >>> > Here is a video showing the software. I've built it for Windows and >>> Mac OS. >>> > I was wondering if this could be implemented in tor. I think it would >>> be an >>> > interesting idea for a tor based email system to make the messages >>> > unrecoverable after use. >>> >>> I'm not a tor-dev, so I can't comment on the interest, but it appears to >>> me that the value added of this idea (basically, using time to seed a >>> PRF/KDF) is very little. All in all, using time to seed keys is not the >>> best idea. It also seems to be on top of PGP, so I'm pretty convinced >>> this doesn't provide perfect forward-secrecy unless you're layering any >>> sort of session key ratcheting mechanism yourself. >>> >>> I think the goal is laudable, but I suggest getting a little bit more >>> involved in cryptography engineering communities to see learn, develop >>> and eventually help change the status quo. >>> >>> Cheers! >>> -S >>> _______________________________________________ >>> tor-dev mailing list >>> tor-dev@lists.torproject.org >>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev >>> >> _______________________________________________ >> tor-dev mailing list >> tor-dev@lists.torproject.org >> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev >> > _______________________________________________ > tor-dev mailing list > tor-dev@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev >
_______________________________________________ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev