On 2013-06-30, at 7:36 PM, James A. Donald <jam...@echeque.com> wrote:

> On 2013-07-01 8:55 AM, Nadim Kobeissi wrote:
>> On 2013-06-30, at 3:44 AM, James A. Donald <jam...@echeque.com>
>>  wrote:
>> 
>> 
>>> On 2013-06-30 5:13 PM, Danilo Gligoroski wrote:
>>> 
>>>> This was expected.
>>>> As Skype definitely ruined its reputation as free end-to-end application 
>>>> for
>>>> secure communication, other products are taking their chances.
>>>> 
>>>> "Agencies showing sudden interest in encrypted comm" ---
>>>> 
>>>> http://gcn.com/blogs/cybereye/2013/06/agencies-sudden-interest-encrypted-com
>>>> 
>>>> m.aspx
>>>> 
>>>> 
>>> Silent Circle expects end users to manage their own keys, which is of 
>>> course the only way for end users to be genuinely secure. Everything else 
>>> is snake oil, or rapidly turns into snake oil in practice. (Yes, Cryptocat, 
>>> I am looking at you)
>> You seem to be implying that Cryptocat does not manage keys on the end-user 
>> side. This is false � Cryptocat users do manage their own keys on the client 
>> side, in fact.
> 
> 
> According to the paper, there are no long term public and private keys.  ID 
> is therefore wholly username and password

Ah, but there are no usernames and passwords either. Sessions are completely 
ephemeral. 

> Cryptocat does not currently store long-term key pairs (see x 9.2), need to 
> be generated, along with DSA pa-rameters, each time 
> the application is launched
> Which of course does not make cryptocat inherently insecure, or fatally 
> flawed, but nonetheless, does not provide the security that would come from 
> users managing their own keys,

But yes, long-term keys are worth investigating.

NK

> if ever we managed to provide an interface where users successfully managed 
> their own keys without screwing up.
> 
> 
> 
> 

_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to