-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 6/10/13 5:15 PM, Hans-Christoph Steiner wrote:
>
> On 06/10/2013 06:45 PM, Paul Wouters wrote:
>> On Wed, 5 Jun 2013, Hans-Christoph Steiner wrote:
>>
>>> Rate limiting will affect both XMPP in-band and OTR in-band the
>>> same. Only an out-of-ba
On 06/10/2013 07:41 PM, Dev Random wrote:
> On 06/10/2013 04:15 PM, Hans-Christoph Steiner wrote:
>>
>> On 06/10/2013 06:45 PM, Paul Wouters wrote:
>>> On Wed, 5 Jun 2013, Hans-Christoph Steiner wrote:
>>>
Rate limiting will affect both XMPP in-band and OTR in-band the same.
Only an
>
On 06/10/2013 04:15 PM, Hans-Christoph Steiner wrote:
>
> On 06/10/2013 06:45 PM, Paul Wouters wrote:
>> On Wed, 5 Jun 2013, Hans-Christoph Steiner wrote:
>>
>>> Rate limiting will affect both XMPP in-band and OTR in-band the same. Only
>>> an
>>> out-of-band file transfer would get around that.
On 06/10/2013 06:45 PM, Paul Wouters wrote:
> On Wed, 5 Jun 2013, Hans-Christoph Steiner wrote:
>
>> Rate limiting will affect both XMPP in-band and OTR in-band the same. Only
>> an
>> out-of-band file transfer would get around that. So we'll need to find a way
>> to deal with that gracefully
On Wed, 5 Jun 2013, Hans-Christoph Steiner wrote:
Rate limiting will affect both XMPP in-band and OTR in-band the same. Only an
out-of-band file transfer would get around that. So we'll need to find a way
to deal with that gracefully regardless of whether its in-band XMPP or OTR.
Why not pro
On 06/06/2013 06:18 AM, Abel Luck wrote:
> Michael Rogers:
>> some quick tests with major IM networks to
>> check that you can push a large amount of data in-band before going to
>> the effort of designing a protocol. I suspect many will drop the
>> connection or even disable the account if you
Michael Rogers:
> some quick tests with major IM networks to
> check that you can push a large amount of data in-band before going to
> the effort of designing a protocol. I suspect many will drop the
> connection or even disable the account if you appear to be flooding.
>
That's a good idea, bu
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 06/06/13 10:05, Max wrote:
> Even if we opt-in for oob transfer for larger files I still think
> that we should send small files in-band.
It might be worth doing some quick tests with major IM networks to
check that you can push a large amount of d
06.06.2013 07:32, Jacob Appelbaum пишет:
> Hans-Christoph Steiner:
>> Nadim Kobeissi
>>>
>>> Hi everyone,
>>> We've been working on the first implementation of OTR file transfer, using
>>> the extra symmetric keys afforded in the latest update to the OTR
>>> specification.
>>>
>>> We've come up wit
Hans-Christoph Steiner:
> Nadim Kobeissi
>>
>> Hi everyone,
>> We've been working on the first implementation of OTR file transfer, using
>> the extra symmetric keys afforded in the latest update to the OTR
>> specification.
>>
>> We've come up with a spec draft, you should check it out!
>> https:/
On 06/05/2013 02:30 PM, Peter Saint-Andre wrote:
> On 6/5/13 12:20 PM, Chris Ballinger wrote:
>> I talked to Miron about this before and my hesitations about
>> sending it through the chat channel is that you risk being
>> throttled or banned by the service because sending a file looks
>> similar
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 6/5/13 12:20 PM, Chris Ballinger wrote:
> I talked to Miron about this before and my hesitations about
> sending it through the chat channel is that you risk being
> throttled or banned by the service because sending a file looks
> similar to a DoS
I talked to Miron about this before and my hesitations about sending it
through the chat channel is that you risk being throttled or banned by the
service because sending a file looks similar to a DoS attack.
Back in the 90s on AIM you could only send so many messages so quickly
before it would bo
On 05/06/13 12:47, Hans-Christoph Steiner wrote:
Oh yeah, I forgot to mention that OTR in-band might continue to work if a XMPP
service decided to block XEP-0047 transfers.
My 2c.
If the point of OTR is to 'just work' on any protocol, surely OTR-FT
should 'just work' on any protocol as well.
On 06/04/2013 10:27 PM, Hans-Christoph Steiner wrote:
> Nadim Kobeissi
>>
>> Hi everyone,
>> We've been working on the first implementation of OTR file transfer, using
>> the extra symmetric keys afforded in the latest update to the OTR
>> specification.
>>
>> We've come up with a spec draft, you
Nadim Kobeissi
>
> Hi everyone,
> We've been working on the first implementation of OTR file transfer, using
> the extra symmetric keys afforded in the latest update to the OTR
> specification.
>
> We've come up with a spec draft, you should check it out!
> https://github.com/cryptocat/cryptocat/
Hi everyone,
We've been working on the first implementation of OTR file transfer, using
the extra symmetric keys afforded in the latest update to the OTR
specification.
We've come up with a spec draft, you should check it out!
https://github.com/cryptocat/cryptocat/wiki/OTR-Encrypted-File-Transfer
17 matches
Mail list logo