[OTR-dev] *No* evidence of intelligence agency decryption of OTR chats

Nadim Kobeissi nadim at nadim.computer
Tue Dec 30 10:27:28 EST 2014


Great news! Thanks Ian for going through the trouble of ‎verifying this.

Sent from my BlackBerry

  Original Message  
From: Ian Goldberg
Sent: Tuesday, December 30, 2014 9:45 AM
To: otr-dev at lists.cypherpunks.ca
Subject: [OTR-dev] *No* evidence of intelligence agency decryption of OTR chats

On Mon, Dec 29, 2014 at 02:14:01PM +0100, Hans-Christoph Steiner wrote:
> 
> Not much to go on here, but I'll add by two bits to the guesswork.
> 
> Like what Ian said, that second transcript looks a lot more like the OTR
> negotitation. So that is a transcript of the entire chat session. That would
> begin with OTRv2? and the whole OTR negoitation, which is plain text. Perhaps
> there might be a couple plain text messages like "hey are you there" before
> OTR started.
> 
> The first transcript could be after one side finished OTR, and the other side
> kept typing.
> 
> I think attacks outside of OTR itself are the most likely culprit as well.
> The NSA analysts do have access to the raw materials, and they are reporting
> that OTR is difficult for them to decode, so that's the good news here.

Good news.

I just talked to Andy Müller-Maguhn here at 31C3, who is one of the
reporters working on this story, and who has access to the unredacted
file.

He says that the non-OTR lines were all separate conversations with
other people (except one line before each, which was content-free to
trigger OTR negotiation). That is, the target was having simultaneous
conversations with multiple people, one of which used OTR and the others
did not.

So all the OTR messages were in fact undecryptable, while the
conversations that didn't use OTR had their messages recovered.

- Ian
_______________________________________________
OTR-dev mailing list
OTR-dev at lists.cypherpunks.ca
http://lists.cypherpunks.ca/mailman/listinfo/otr-dev


More information about the OTR-dev mailing list