[OTR-dev] MAC keys to be revealed

verbal verbal at gmail.com
Thu Jan 20 22:55:02 EST 2005


and i guess that's why there's all this extra complexity with the
changing of public keys so that each key can have a "time" associated
with it. combine this with some onion routing (tor.eff.org) and you
can pretty much not be held responsible for most things you do about
99% of the time ;).


On Thu, 20 Jan 2005 22:29:44 -0500, alex323 <alex323 at gmail.com> wrote:
> Hmm.. that does seem more logical if you put it that way. I guess in
> court you can say, "Anyone could have forged it."
> 
> verbal wrote:
> 
> >do you mean you dont understand why you would want to send our your
> >old mac keys? if that is the question, then the answer is because it
> >allows for your conversation to be forged at a later point in time.
> >this lets you say "hey, i didnt say that" after the conversation time
> >period. during the conversation period, no one can read your
> >conversation or pretend to be you.
> >
> >hope that helps,
> >
> >verbal
> >
> >
> >On Thu, 20 Jan 2005 20:36:03 -0500, alex323 <alex323 at gmail.com> wrote:
> >
> >
> >>Ian Goldberg wrote:
> >>
> >>
> >>
> >>>On Thu, Jan 20, 2005 at 04:06:28PM -0500, alex323 wrote:
> >>>
> >>>
> >>>
> >>>
> >>>>Do you HAVE to send out your old MAC keys?
> >>>>
> >>>>
> >>>>
> >>>>
> >>>Even moreso than all those surveillance cameras everywhere, it's
> >>>For Your Protection.  You really really want people to be able to forge
> >>>messages after the fact.
> >>>
> >>>
> >>>
> >>>
> >>Why? I cannot fathom why you'd want that.
> >>
> >>
> 
> 
>



More information about the OTR-dev mailing list