Re: [cryptography] Silent Circle Takes on Phones, Skype, Telecoms

2014-07-11 Thread James A. Donald
On 2014-07-11 07:45, Kevin wrote: On 7/10/2014 4:39 PM, John Young wrote: https://blog.silentcircle.com/why-are-we-competing-with-phone-makers-skype-and-telecom-carriers-all-in-the-same-week/ With silent circle, when Ann talks to Bob, does Ann get Bob's public key from silent circle, and Bob

Re: [cryptography] Silent Circle Takes on Phones, Skype, Telecoms

2014-07-11 Thread Michael Rogers
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 11/07/14 11:27, James A. Donald wrote: On 2014-07-11 07:45, Kevin wrote: On 7/10/2014 4:39 PM, John Young wrote: https://blog.silentcircle.com/why-are-we-competing-with-phone-makers-skype-and-telecom-carriers-all-in-the-same-week/ With

Re: [cryptography] Silent Circle Takes on Phones, Skype, Telecoms

2014-07-11 Thread ianG
On 11/07/2014 11:27 am, James A. Donald wrote: On 2014-07-11 07:45, Kevin wrote: On 7/10/2014 4:39 PM, John Young wrote: https://blog.silentcircle.com/why-are-we-competing-with-phone-makers-skype-and-telecom-carriers-all-in-the-same-week/ With silent circle, when Ann talks to Bob, does Ann

Re: [cryptography] Silent Circle Takes on Phones, Skype, Telecoms

2014-07-11 Thread James A. Donald
On 2014-07-11 20:59, Michael Rogers wrote: For phone calls they use ZRTP, so Ann and Bob can verbally compare short authentication strings after the key exchange to detect a MITM, *if* they know each other's voices and their voices can't be faked. ZRTP carries keying material forward from one

Re: [cryptography] Silent Circle Takes on Phones, Skype, Telecoms

2014-07-11 Thread StealthMonger
ianG i...@iang.org writes: On 11/07/2014 11:27 am, James A. Donald wrote: On 2014-07-11 07:45, Kevin wrote: On 7/10/2014 4:39 PM, John Young wrote: https://blog.silentcircle.com/why-are-we-competing-with-phone-makers-skype-and-telecom-carriers-all-in-the-same-week/ With silent circle, when

Re: [cryptography] Silent Circle Takes on Phones, Skype, Telecoms

2014-07-11 Thread Dominik Schuermann
On 07/11/2014 04:23 PM, StealthMonger wrote: While I'm interested in how they're doing that, I'm far more interested in how Ann convinces Bob that she is Ann, and Bob convinces Ann that he is Bob. We left the OpenPGP/cert building a long time ago, we need more than just 1980s PKI ideas with

[cryptography] Silent Circle Takes on Phones, Skype, Telecoms

2014-07-10 Thread John Young
https://blog.silentcircle.com/why-are-we-competing-with-phone-makers-skype-and-telecom-carriers-all-in-the-same-week/ ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography

Re: [cryptography] Silent Circle Takes on Phones, Skype, Telecoms

2014-07-10 Thread Kevin
On 7/10/2014 4:39 PM, John Young wrote: https://blog.silentcircle.com/why-are-we-competing-with-phone-makers-skype-and-telecom-carriers-all-in-the-same-week/ ___ cryptography mailing list cryptography@randombit.net

Re: [cryptography] Silent Circle Takes on Phones, Skype, Telecoms

2014-07-10 Thread John Young
This is the comsec dilemma. If a product or system becomes mainstream it is more likely to be overtly and/or covertly compromised. If marginal it is likely to be used by few and consequently not well tested against overt and/or covert faults and compromise, may go out of of business, or aquired

Re: [cryptography] Silent Circle Takes on Phones, Skype, Telecoms

2014-07-10 Thread Eirik
On 10 July 2014 22:39:01 CEST, John Young j...@pipeline.com wrote: https://blog.silentcircle.com/why-are-we-competing-with-phone-makers-skype-and-telecom-carriers-all-in-the-same-week/ I think a lot of the stuff Silent Circle is doing looks great; but I think we need a real open OS (perhaps

Re: [cryptography] Silent Circle Takes on Phones, Skype, Telecoms

2014-07-10 Thread Tony Arcieri
On Thu, Jul 10, 2014 at 4:45 PM, John Young j...@pipeline.com wrote: This is the comsec dilemma. If a product or system becomes mainstream it is more likely to be overtly and/or covertly compromised. This is why it's important the client is open source, the binaries are reproducible, and the

Re: [cryptography] Silent Circle Takes on Phones, Skype, Telecoms

2014-07-10 Thread shawn wilson
On Thu, Jul 10, 2014 at 10:52 PM, Tony Arcieri basc...@gmail.com wrote: On Thu, Jul 10, 2014 at 4:45 PM, John Young j...@pipeline.com wrote: This is the comsec dilemma. If a product or system becomes mainstream it is more likely to be overtly and/or covertly compromised. I don't find this a