Sysop: | Amessyroom |
---|---|
Location: | Fayetteville, NC |
Users: | 28 |
Nodes: | 6 (0 / 6) |
Uptime: | 43:12:29 |
Calls: | 422 |
Calls today: | 1 |
Files: | 1,024 |
Messages: | 90,180 |
On 2/18/2025 1:58 PM, Chris M. Thomasson wrote:
On 2/18/2025 1:53 PM, Onion Courier wrote:
Let's assume Bob travels a lot and does not want to take any devices
with him, including his private keys, email addresses etc., but Alice wants to be sure that she is communicating securely with Bob, once he arrived at his various destinations.
Prior his departure they both agreed on (a) shared secret(s) they will use.
If this is a truly secret key, then they are already setup for a secure channel anyway using existing symmetric encryption techniques?
90f940ad4454ef7170e353a0ed7f4879ee06e544a4e7cde58776cd02ce0d98ba52820d8f71784bf9c9e0a6badb0749b2d6a33ea1603d97da9ad1f52a4b8f8375e1bc136e362089933956d1cc3cb99883a969f8a944bbb3cc7c428caed0cb1aeb8cb170b414612553fdfe6a8f56e94d9f9ba071e6f05ehttp://fractallife247.com/test/hmac_cipher/ver_0_0_0_1? ct_hmac_cipher=189e8b754b816c819e0dd0d9c33a65de192cc7b83213ae1a267626c6cc876515b5f3693848472fa86496b3d7ce280ef96c8bd421ad782c1682fd5f85234a39f5df0f439daabe2f01676108f5808c681b20bc0b6d95750355fad62e7ab577b5e505ef5b9ee9d8f12378021e81e97df1f9461fb1f22511
[...]
Or are you talking about Bob getting kidnapped, and exposed to the
rubber hose treatment? Then AgentX has the secret key; Spoofs as Bob
into luring Alice into a rather precarious scenario?
On 2/19/2025 5:48 AM, Stefan Claas wrote:
Chris M. Thomasson wrote:
On 2/18/2025 1:58 PM, Chris M. Thomasson wrote:
On 2/18/2025 1:53 PM, Onion Courier wrote:
Let's assume Bob travels a lot and does not want to take any devices with him, including his private keys, email addresses etc., but Alice wants to be sure that she is communicating securely with Bob, once he arrived at his various destinations.
Prior his departure they both agreed on (a) shared secret(s) they will
use.
If this is a truly secret key, then they are already setup for a secure channel anyway using existing symmetric encryption techniques?
251190f940ad4454ef7170e353a0ed7f4879ee06e544a4e7cde58776cd02ce0d98ba52820d8f71784bf9c9e0a6badb0749b2d6a33ea1603d97da9ad1f52a4b8f8375e1bc136e362089933956d1cc3cb99883a969f8a944bbb3cc7c428caed0cb1aeb8cb170b414612553fdfe6a8f56e94d9f9ba071e6f05ehttp://fractallife247.com/test/hmac_cipher/ver_0_0_0_1? ct_hmac_cipher=189e8b754b816c819e0dd0d9c33a65de192cc7b83213ae1a267626c6cc876515b5f3693848472fa86496b3d7ce280ef96c8bd421ad782c1682fd5f85234a39f5df0f439daabe2f01676108f5808c681b20bc0b6d95750355fad62e7ab577b5e505ef5b9ee9d8f12378021e81e97df1f9461fb1f2
[...]
Or are you talking about Bob getting kidnapped, and exposed to the
rubber hose treatment? Then AgentX has the secret key; Spoofs as Bob
into luring Alice into a rather precarious scenario?
I am talking about that Bob travels a lot, without any device and keys, passwords etc. and he must establish a channel to Alice, so that he
can communicate securely, without email, social media etc. with Alice
and that she knows it is him.
What would be the communication channel? How does Bob get in touch with
Alice without email, social media, ect? Define ect?
Chris M. Thomasson wrote:
On 2/19/2025 5:48 AM, Stefan Claas wrote:
Chris M. Thomasson wrote:
On 2/18/2025 1:58 PM, Chris M. Thomasson wrote:
On 2/18/2025 1:53 PM, Onion Courier wrote:
Let's assume Bob travels a lot and does not want to take any devices
with him, including his private keys, email addresses etc., but Alice
wants to be sure that she is communicating securely with Bob, once he
arrived at his various destinations.
Prior his departure they both agreed on (a) shared secret(s) they will
use.
If this is a truly secret key, then they are already setup for a secure
channel anyway using existing symmetric encryption techniques?
f2251190f940ad4454ef7170e353a0ed7f4879ee06e544a4e7cde58776cd02ce0d98ba52820d8f71784bf9c9e0a6badb0749b2d6a33ea1603d97da9ad1f52a4b8f8375e1bc136e362089933956d1cc3cb99883a969f8a944bbb3cc7c428caed0cb1aeb8cb170b414612553fdfe6a8f56e94d9f9ba071e6f05ehttp://fractallife247.com/test/hmac_cipher/ver_0_0_0_1? ct_hmac_cipher=189e8b754b816c819e0dd0d9c33a65de192cc7b83213ae1a267626c6cc876515b5f3693848472fa86496b3d7ce280ef96c8bd421ad782c1682fd5f85234a39f5df0f439daabe2f01676108f5808c681b20bc0b6d95750355fad62e7ab577b5e505ef5b9ee9d8f12378021e81e97df1f9461fb1
[...]
Or are you talking about Bob getting kidnapped, and exposed to the rubber hose treatment? Then AgentX has the secret key; Spoofs as Bob into luring Alice into a rather precarious scenario?
I am talking about that Bob travels a lot, without any device and keys, passwords etc. and he must establish a channel to Alice, so that he
can communicate securely, without email, social media etc. with Alice
and that she knows it is him.
What would be the communication channel? How does Bob get in touch with Alice without email, social media, ect? Define ect?
Like the Subject: says, they both use Bitmessage. ;-)
With Bitmessage the delivery of messages is 100% guaranteed, compared
for example with unreliable anonymous Remailers etc. Alice, at home,
can use Bitmessage with the Tor Network, while Bob can use it without
Tor, in case Tor is censored in some countries he travels. Bitmessage
is a secure/anonymous alternative to email/Usenet.
On 2/19/2025 12:18 PM, Stefan Claas wrote:
Chris M. Thomasson wrote:
On 2/19/2025 5:48 AM, Stefan Claas wrote:
Chris M. Thomasson wrote:
On 2/18/2025 1:58 PM, Chris M. Thomasson wrote:
On 2/18/2025 1:53 PM, Onion Courier wrote:
Let's assume Bob travels a lot and does not want to take any devices
with him, including his private keys, email addresses etc., but Alice
wants to be sure that she is communicating securely with Bob, once he
arrived at his various destinations.
Prior his departure they both agreed on (a) shared secret(s) they will
use.
If this is a truly secret key, then they are already setup for a secure
channel anyway using existing symmetric encryption techniques?
b1f2251190f940ad4454ef7170e353a0ed7f4879ee06e544a4e7cde58776cd02ce0d98ba52820d8f71784bf9c9e0a6badb0749b2d6a33ea1603d97da9ad1f52a4b8f8375e1bc136e362089933956d1cc3cb99883a969f8a944bbb3cc7c428caed0cb1aeb8cb170b414612553fdfe6a8f56e94d9f9ba071e6f05ehttp://fractallife247.com/test/hmac_cipher/ver_0_0_0_1? ct_hmac_cipher=189e8b754b816c819e0dd0d9c33a65de192cc7b83213ae1a267626c6cc876515b5f3693848472fa86496b3d7ce280ef96c8bd421ad782c1682fd5f85234a39f5df0f439daabe2f01676108f5808c681b20bc0b6d95750355fad62e7ab577b5e505ef5b9ee9d8f12378021e81e97df1f9461f
[...]
Or are you talking about Bob getting kidnapped, and exposed to the rubber hose treatment? Then AgentX has the secret key; Spoofs as Bob into luring Alice into a rather precarious scenario?
I am talking about that Bob travels a lot, without any device and keys, passwords etc. and he must establish a channel to Alice, so that he
can communicate securely, without email, social media etc. with Alice and that she knows it is him.
What would be the communication channel? How does Bob get in touch with Alice without email, social media, ect? Define ect?
Like the Subject: says, they both use Bitmessage. ;-)
With Bitmessage the delivery of messages is 100% guaranteed, compared
for example with unreliable anonymous Remailers etc. Alice, at home,
can use Bitmessage with the Tor Network, while Bob can use it without
Tor, in case Tor is censored in some countries he travels. Bitmessage
is a secure/anonymous alternative to email/Usenet.
How does it get around the rubber hose treatment?
On 2/19/2025 12:25 PM, Stefan Claas wrote:
With Bitmessage the delivery of messages is 100% guaranteed, compared for example with unreliable anonymous Remailers etc. Alice, at home, can use Bitmessage with the Tor Network, while Bob can use it without Tor, in case Tor is censored in some countries he travels. Bitmessage is a secure/anonymous alternative to email/Usenet.
How does it get around the rubber hose treatment?
Very well, because rubber hose is only availabe in US/UK? and not in
very big Eurasia. :-D :-D :-D
;^)
Hey Bob you will communicate with Alice right now or else it gets the
hose again! Bob says, oh shit that hurts!