eb
temp
ebef8624e24811a0d7f479dea97454e496cf5b230fe62570c0be14b8bca5b17a

Why don't you give me the information instead, so that I can make my own decision. So far, I have made few bad decisions and I've been attacked over all kinds of rotten, stupid behavior based on false information.

Replying to Avatar Ch!llN0w1

What choices? I've heard a lot of bullshit.

Replying to Avatar Ch!llN0w1

I think you vastly underestimate how much deception and abuse has been going on.

Replying to Avatar Ch!llN0w1

Nah, that's not it. The harassment and abuse was first. To attack me for 8 years, and then call me arrogant for stating a truthful position, is not ego. It's self-respect for stating the circumstances as they are, instead of being swallowed by an abusive misinformed population.

Replying to Avatar Ch!llN0w1

You're missing the point. It was never about "avoiding conflict". There is massive malicious acting on part on a large number of people.

Sure. I was thinking you meant network-level (passive) observation.

Any OS-privileged compromise would possibly affect any program, with the exception of "third-party" "assistance" such by using TPM or TEE right? (Unless you meant something like hooking into keyboard-handling hooks that aren't well protected/separated/isolated.)

Does Keychat do this differently, or any other reason for the emphasis?

Also, slight inaccuracy but nitpicking. One can send multiple messages in a series all in the same ratchet. So it isn't a "single" message. I'm guessing you meant that.

Replying to Avatar Keychat

OTR: Off-the-Record protocol

“Off-the-Record Communication, or, Why Not To Use PGP” is the title of the paper that introduces the OTR protocol.

The OTR protocol separates the identity key from the encryption keys. Encryption keys are continually derived and deleted after use, providing both forward secrecy and backward secrecy.

Alice and Bob each know the other’s identity public key. When they add each other as contacts, they each randomly generate a Diffie–Hellman private/public key pair—[S(a1), P(a1)] and [S(b1), P(b1)]—and exchange the public keys. The identity keys indirectly authenticate that the DH public keys genuinely come from the other party.

Each side then uses its own DH private key and the other’s DH public key to perform a Diffie–Hellman calculation and derive the same shared key:

SK1 = S(a1) × P(b1) = S(b1) × P(a1).

Alice encrypts message M1 to Bob with SK1. Before sending M1, she also generates a new DH key pair [S(a2), P(a2)] and attaches P(a2) to M1.

When Bob receives M1, he decrypts it with SK1. He then prepares M2 (a reply to M1), randomly generates a new DH key pair [S(b2), P(b2)], performs a DH calculation to obtain

SK2 = S(b2) × P(a2),

encrypts M2 with SK2, and appends P(b2) to M2.

After Alice receives M2, she performs a DH calculation to obtain the same

SK2 = S(a2) × P(b2)

and decrypts M2 with it. When preparing M3 (a reply to M2), Alice randomly generates [S(a3), P(a3)], performs a DH calculation to derive

SK3 = S(a3) × P(b2),

encrypts M3 with SK3, and attaches P(a3).

This process continues indefinitely; it is called the DH ratchet, which keeps turning forward.

The DH ratchet advances in step with the back-and-forth messages, so users passively gain forward and backward secrecy simply by continuing to exchange messages.

If a DH private key is compromised at some moment, an attacker can decrypt only that single message. After the parties exchange another message and the DH ratchet advances, they recover from the compromise. (The “compromise” here does not refer to continuous real-time eavesdropping—encryption cannot help against that—but rather to an attacker capturing a key at one moment and being unable to keep decrypting subsequent messages.)

What kind of eavesdropping are you referring to?

Well, it's not so much about a single message as it is about a single series. Both parties need to have sent a message to achieve confirmation of new keys. Multiple messages sent back to back of one party all use same key, iirc.

Replying to Avatar Ch!llN0w1

Sorry man. You can't dismiss all of the malicious bullshit that easily. A lot happened in physical vicinity and with real people. You cannot blame a chatbot for those.

Standing by my principles isn't easy and isn't pleasurable. Drawing a line for what is abuse on top of abuse on top of abuse, isn't pleasurable. It has to stop somewhere.

Stop making convenient arbitrary assumptions.

Replying to Avatar Ch!llN0w1

Nice try. You are responding to false claims. And you are unable to disprove your assumptuous implications.

Replying to Avatar Ch!llN0w1

What failure? It's all arbitrary bullshit. It isn't based in reality.

I have been stabbed in the back for at least the last 10 years. I have had to deal with constant unexplained attacks and persistent blocking/rejection/dismissal/denial of the truth. Every attempt at peaceful resolution gets blocked and abused. The last 10 years of my life have been ruined WHILE I TRIED TO FIND PEACEFUL SOLUTIONS AND ATTEMPTED TO CLARIFY THEIR "MISUNDERSTANDINGS".

What point are you making?

Replying to Avatar Ch!llN0w1

I don't understand what point you're trying to make.

Don't be an idiot. One or two programmers/reviewers/auditors could've told you the state of affairs, independent review. You all chose attacking and thus exposed that you really cared more about being the asshole than privacy and security as *principles*.

One nostrich called it: many people, including very much in security field, exposed what they really cared about: money, attention, exposure.

Replying to Avatar Ch!llN0w1

I have no clue what point you think you're trying to make.

Replying to Avatar Ch!llN0w1

Wait .. you people came up with the Andrew Tate refs first. Why was that?

It is when their projections become collective delusion and these deluded people decide that a coordinated harassment campaign is a necessary "solution".

Waaaaaiiiit a minute. Aren't you chancelor to the Klingon High Council or smth? What about your army, your battle spirit, your honor?

nostr:nprofile1qqsxpuhwm8qys9q4gc7e0xvjp8mp6apf2ukptkyhrsc6hzqjd93vjrcpz4mhxue69uhkummnw3ezummcw3ezuer9wchs4xcj98 I need information about all the malicious and manipulative bullshit that's going on.

I thought your lawyer advised you not to encourage violence. 😋