Difference between revisions of "Thread:Talk:SenderKeys/Threat model"

(New thread: Threat model)
 
m
 
Line 1: Line 1:
It is impossible to judge a protocol when we have no threat model/what goal the protocol is hoping to acheive. I think we should agree on that first, before discussing the protocol.
+
It is impossible to judge a protocol when we have no threat model/what goal the protocol is hoping to acheive. I think we should agree on that first, before discussing the protocol. More specifically, which of the following OTR goals we are aiming to acheive:
 +
 
 +
1. Participant Authentication.
 +
2. Room view consistency.
 +
3. Message origin Authentication.
 +
4. Forward secrecy.
 +
5. Transcript Consistency.
 +
6. Deniability.

Latest revision as of 14:30, 4 September 2014

It is impossible to judge a protocol when we have no threat model/what goal the protocol is hoping to acheive. I think we should agree on that first, before discussing the protocol. More specifically, which of the following OTR goals we are aiming to acheive:

1. Participant Authentication. 2. Room view consistency. 3. Message origin Authentication. 4. Forward secrecy. 5. Transcript Consistency. 6. Deniability.