[OTR-users] Decrypt manually and externally

db db.netres at gmail.com
Thu Apr 3 03:41:42 EDT 2008


On Mon, Mar 31, 2008 at 7:16 PM, Adam Zimmerman <adam_zimmerman at sfu.ca> wrote:
>
> You're thinking of your long-lived keys. These aren't actually used to
> encrypt conversations, just to sign the first (randomly-generated I
> think) session encryption key to prove you are actually the one starting
> the conversation. The idea is that after a conversation, nobody can
> decrypt the original text with any certainty, and nobody can verify
> (cryptographically, at least) that you said a certain thing. Your
> conversation is "off the record."

I guess long-lived keys is what I am looking for. My purpose with OTR
is to prevent eavesdropping, not deniability. My local storage for the
keys and the chat history is AES encrypted.

Would it be possible to add an option (feature) to OTR to use a more
PGP-like approach to the encryption?



More information about the OTR-users mailing list