-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 7/12/13 1:24 PM, Matthew Wild wrote: > On 12 July 2013 19:56, Steffen Larsen <[email protected]> wrote: >> I just stumbled upon https://heml.is, which is a new XMPP client >> for IOS and Android. Anyone knows these guys? > > https://en.wikipedia.org/wiki/Peter_Sunde and others (some also > behind the payment service Flattr). > >> It uses XMPP and PGP for encryption, but do any of you guys know >> if they federate?.. What I can see from skimming their page, its >> yet another silo, due to the fact of PGP and their own >> infrastructure. So federation and using your own domain does not >> seem feasible, right? Anyone want to discuss this and the >> alternatives besides OTR? Security labels? > > " == Your server only? == Yes! The way to make the system secure is > that we can control the infrastructure. Distributing to other > servers makes it impossible to give any guarantees about the > security. We’ll have audits from trusted third parties on our > platforms regularily, in cooperation with our community. > > For those interested in a bit of our tech backend infrastructure: > We’re building encrypted tunnels/MPLS networks between countries, > with anycast ingress/egress points so that your traffic should pass > as few borders as possible. Messages will be sent to as close as > possible to the recipient, which makes it impossible for agencies > like NSA and FRA to see who’s talking to whom. This sort of virtual > local network makes Heml.is much more secure than a regular system > that can’t avoid border crossings. " > > Needless to say I disagree with this model, or their assertions > (which secure s2s solves just as well).
I'm with you, but we don't have secure s2s. In general, XMPP server implementations don't perform proper (RFC 6125 / RFC 6120) certificate checking and don't have an option to refuse connections from domains that lack proper certificates. Existing XMPP deployments too often don't have proper certificates, either. And we need to figure out solutions to the multi-tenant problem (see draft-ietf-xmpp-dna and draft-miller-posh at the IETF, as well as eventually DNSSEC/DANE), so that larger hosting providers can offer and enforce secure s2s. I know that there's work going on here (standards, server code, and some deployments), but it's not proceeding fast enough... Peter - -- Peter Saint-Andre https://stpeter.im/ -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.19 (Darwin) Comment: GPGTools - http://gpgtools.org Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/ iQIcBAEBAgAGBQJR4GQWAAoJEOoGpJErxa2p3gIP/jfhqcOAhjQ+ewxKpQiiaHwd 0mj0dur2XndttFgurNsfRFsnc1zespJulcMktVjH6f+OB3dQtD3TxqE/OA7EgtQU q3IjkbxhhQH4HFiCcBvzgxF/90eQbehuPeoRYep3DvAXxuzjogOBRDjzWV2p/I9k zVDCkUgCk7X99+M287oUjo8hdES61jSi5wwX0S5NdGYp7Xi6yVG8uHPLTcIq5LVS fq0xSb/XzB6WRwfp6Fwvxka6lVLPlvmNKgDDKRo89sTPkCAKu1Eiilnxp3nUmhCy IXF1KKoXIOPfiq9RyO1Mpng0WUJ6EzUd4+qRofC673hhDIWogi8604eY20tY3mzR 8SSj9ia6iFDm0bXRoPPSUue3on8+i3cj7JyJ0oRDIsxWTqpZBDIfA05/ueBlutm+ AbgJlS4qKg/5D1LKe6cVUwGCCFPtGxf6e0g1pn1AcELvW2WeMCbWtiu06hAWaq+6 svIcasA/0OXdxRJqxM+3gODLM2DznK6pvUy2crPg/Wdv371qO5p2s087tCFFLI8q 42dTZapKOkrNHR5sfmkiyA1XyQksCibTTSP8tjYdEKHsdW0TAWeUBo2t+m1ybyr3 +dszU+D+t5yqz9uYjeAupQQBL8Gj198HfmFMb9y4pyfiVR7IIW7DCXg6CdbBdYe4 z4TPz2HO2BGAaVxGcY+a =eYSV -----END PGP SIGNATURE----- _______________________________________________ JDev mailing list Info: http://mail.jabber.org/mailman/listinfo/jdev Unsubscribe: [email protected] _______________________________________________
