Re: E-mail with deniable authentication

2017-08-30 Thread Mario Castelán Castro
Hello. Thanks for your reply. I am aware of the first method as well as a variation of the second (it had not occurred to me that they both can use the same key!; I had thought that each correspondent used one key of his own with a meaningless ID and used only for communication with the other corre

Re: E-mail with deniable authentication

2017-08-30 Thread Mario Castelán Castro
On 30/08/17 00:57, Stefan Claas wrote: > If your communication partners would use the same software, like opmsg. > > https://github.com/stealth/opmsg > > Or if you would use Bitmessage instead of classic email, then > you have authenticated/encrypted messages too and can later > nuke your keys, i

Re: E-mail with deniable authentication

2017-08-30 Thread Mario Castelán Castro
On 30/08/17 21:35, Mario Castelán Castro wrote: > (2) can be signed > without deniablity implications, but is not necessary. Apologies. The authentication code should not be signed either to keep full deniability. -- Do not eat animals; respect them as you respect people. https://duckduckgo.com/?

Re: key_confusion

2017-08-30 Thread Mario Castelán Castro
Hello. Your message is very bad written and I can barely understand it. I will answer what I have understood. On 30/08/17 10:40, miz...@elude.in wrote: > *** > hi all, > > i do not clearly understand the difference between .asc , .gpg , .sign ,

Looking up keys from a massive store

2017-08-30 Thread Rick van Rein
Hello, I am investigating how to use GnuPG in a content_filter. I found an old post https://lists.gt.net/gnupg/users/53184 where the linear search through the keyring was mentioned as a scaling problem for the number of keys. That would probably hit us too. If I've seen it correctly, the keyb

key_confusion

2017-08-30 Thread mizett
*** hi all, i do not clearly understand the difference between .asc , .gpg , .sign , .sig , cert and do not know the official_usage & conventions. i made my own research before but ... unsuccessfully. i built my curve keys using these commands_o

Re: E-mail with deniable authentication

2017-08-30 Thread Peter Lebbing
On 30/08/17 12:39, Stefan Claas wrote: > But then it would be imho advisable that you use a different timestamp (time > in the future), because when verifying the published message the timestamp > would be earlier than the time the sec key would have appeared on the net, > right? Either the timest

Re: E-mail with deniable authentication

2017-08-30 Thread Stefan Claas
Am 30.08.2017 um 11:43 schrieb Peter Lebbing: With a little scripting, you could create a new ECC keypair (fast!) for each message, sign the keypair with your normal key, sign the message with the ECC keypair. And when you want to backpedal on a signed message, publish the private ECC key and s

Re: E-mail with deniable authentication

2017-08-30 Thread Peter Lebbing
On 30/08/17 11:34, Mario Figueiredo wrote: > Examples are > dictatorships, and many forms of human relationships, including job > relations. I don't think a repudiable message lets you off the hook in those examples either, least of all the dictatorship...! > If one wants to use deniability with

Re: E-mail with deniable authentication

2017-08-30 Thread Mario Figueiredo
On Tue, 29 Aug 2017 14:33:46 -0400 "Robert J. Hansen" wrote: > You can prove origination *only if* you can prove the originating PC > was not compromised. Given how common compromise is today -- a few > years ago Vint Cerf estimated one in four desktop PCs was compromised > -- this is a very hig