• 1 Post
  • 2 Comments
Joined 10 days ago
cake
Cake day: March 22nd, 2025

help-circle


  • Hey! Thanks for taking a look! The contacts shared by the initiator were intended to be generated randomly. I completely missed how a captured or malice initiator could impact other users. I suppose I figured it would be unlikely an adversary would be able to get a initiators keys and capture the correct traffic on the TOR network to decrypt the other users after they generate a fresh set of keys

    The combination of TOR and HTTPS encryption is mostly just a bonus to slow down attackers rather then a real security mechanism. As for the HTTPS cets, I assumed the ones passed by the server could be trusted by default since it wasn’t for security, and all incoming data would be encrypted.

    The reason I’m focusing on symmetric encryption as the only security mechanism is due to its particular resistance against quantum attacks. From what I could tell, even post quantum encryption schemes, have the possibility of being cracked in the future.

    I might do away with introduction entirely if I cant find a good way to pass they keys without relying on asymmetric keys.

    I really appreciate the review, a second set of eyes is always invaluable. Ill check out Tamarin as well :).