[OTR-dev] daemon-only?

Alex Black enigma at turingstudio.com
Thu Feb 7 03:21:54 EST 2008


> It can't be quite this simple, because there has to be a means to  
> defend against the possible MITM attack.  Also, there are  
> circumstances when one can legitimately generate more than one key.  
> As a UI designer, you have to consider how to minimize confusion for  
> the users in those situations.

generate more than one key = single command. do you mean more than one  
key for an individual username? never had cause to do it. would those  
keys be used for specific recipients?

> There also have to be mechanisms to indicate when a session is  
> private and when it is exposed.

Is it insane to have OTR announced in the chat session (proxy  
masquerading as the other user)? would certainly be in context..

>> Much of what I see in the UI is an attempt to deal with these  
>> issues I've outlined above.  That doesn't necessarily mean I think  
>> think it's a well-executed design. ;-)

ok:

keygen can be handled either with a simple commandline app or with a  
slightly fancier standalone ui, though I don't see the point given the  
audience for an OTR proxy ;) I think most can, at minimum, get to a  
terminal and execute a command.

which leaves announcing the session is encrypted or in the clear and  
soliciting user approval for the acceptance of keys. the former can be  
a matter of preference: "I don't care / don't tell me" "announce the  
status whenever it changes" or "announce only when encryption is being  
used". the latter can I think be effectively handled by a simple  
dialog. even something fancy that fades up ;)

best,

_alex


--
alex black
founder, turing
510 666 0074
enigma at turingstudio.com




More information about the OTR-dev mailing list