Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

OTR can be trivially faked. So if you have a transcript of me saying "I did not commit the crime.", you can easily manufacture "I did commit the crime." And that's how it should be.


So... OTR provides a way out from the PKI trap of requiring a private key to encrypt (which in turn demonstrates access to the private key).

Perhaps I'm thinking about it narrowly, but that's all OTR is said to do, yes?


If you have a cipher that produces a stream of good pseudorandom numbers, you can use that as a one time pad. Forging is trivial.

If I remember correctly: For the individual messages OTR uses Diffie-Hellman to exchange the key. That means your dialog partner knows the same key, and could have produced the message, too.

But if you want the details, look up http://www.cypherpunks.ca/otr/Protocol-v2-3.1.0.html




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: