[OTR-dev] mpOTR protocol phases and research questions

Gregory Maxwell gmaxwell at gmail.com
Wed Oct 23 17:49:21 EDT 2013


On Wed, Oct 23, 2013 at 9:10 AM, David Goulet <dgoulet at ev0ke.net> wrote:
> done by broadcasting the ephemeral keys after usage, any entity with
> some ressources (let say here a government) could make some time
> correlated attack with a set of clear text logs and the OTR packets.

Yes, they must have sophisticated resources such as the sacred
knoweldge of the "man" command.

With that dark power in hand they can invoke the sacred ritual of "man
otr_modify" which will teleport into their minds the lost knoweldge of
OTR transcript forgery!

:P

On Wed, Oct 23, 2013 at 10:00 AM, Trevor Perrin <trevp at trevp.net> wrote:
> Deniability is easily achieved if you just use Diffie-Hellman based
> key agreements without signatures

Thats a whole lot of DH for a room with 100 people in it (3*N^2).



More information about the OTR-dev mailing list