Forums before death by AOL, social media and spammers... "We can't have nice things"
|    alt.privacy    |    Discussing privacy, laws, tinfoil hats    |    112,125 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 111,056 of 112,125    |
|    Gabx to Peter Fairbrother    |
|    Re: Nofuture Memguard PostQuantum    |
|    19 Feb 25 14:09:38    |
      tk4facb76jgl3sc3nda3sz4fqd.onion> 17d8c6e1       XPost: alt.privacy.anon-server, sci.crypt       From: nessuno@domain.invalid              Peter Fairbrother wrote:>> https://safecomms.virebent.art/leggimi.html       >>       >       > From the description, it doesn't seem to have any authentication or       > anti-MITM protection.       >       > Peter Fairbrother.              Authentication is based on a combination of digital signatures and secure key       exchange.       Each client generates a pair of Kyber1024-90s keys for key exchange and a pair       of Dilithium5-AES to sign and authenticate messages.       Keys are immediately locked in RAM using memguard to prevent memory theft.       The client signs its initial message (e.g. "Hello Server") with the private       key Dilithium5-AES.The signed message is sent together with the public key       Kyber1024-90s.The server verifies the signature with the received public key       Dilithium5-AES. If the        signature is valid, the server accepts the connection. Otherwise, it closes       immediately.After authentication, the server encapsulates a secret key using       the received public key.The client decapsula the secret using its own private       key.If everything went        well, Both parties now share a secure secret key.       Digital Signature Protection Post-Quantum              Each initial message is signed with Dilithium5-AES, so an attacker cannot       generate valid signatures without the private key.       The server checks the signature and rejects non-authentic connections.       Signatures are post-quantum secure, so not vulnerable to quantum-based attacks.       Even if an attacker succeeds in intercepting the initial message, they cannot       generate a valid secret key without the private key of the legitimate user.       Kyber1024-90s ensures that key exchange is not vulnerable to replay or       downgrade attacks.       The keys are never transmitted in plain text, only encapsulated keys.       Memguard: RAM protection       Private keys and derived keys are stored in encrypted RAM.       Not even a root user can access memguard-protected memory.       Data is automatically destroyed when it is no longer needed.              I hope to have answered in a comprehensive way.              Gabx              --- SoupGate-DOS v1.05        * Origin: you cannot sedate... all the things you hate (1:229/2)    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca