• 3 Posts
  • 7 Comments
Joined 6 months ago
cake
Cake day: February 6th, 2025

help-circle
  • that’s on the person forging, it’s not doing any crazy forging on its own. it could, but like you said, i think that’d run into an issue of not being believable by not matching the personas and conversation context. that said, my belief is you probably don’t need perfect forgeries, just the ability to create plausible ones.

    there’s still lots of open questions around usability and the practical deniability of it, just want to make sure the crypto side makes sense.



  • sure!

    during or after a conversation, anyone with the keys can create fake transcripts by creating messages with the same metadata, same nonce, different content.

    because of this, no transcript can be proven to be the correct transcript. the trade-off is you don’t get forward secrecy on the per-message level, but you get it per-conversation.

    another detail is that there is no identity, so all the above aside, there’s also no way to prove who sent which message.






  • interesting point! i chose symmetric shared key because it means you can’t prove who sent what message.

    the shared secret does add some authentication, which i think is necessary. the goal is it only creates enough to be practical (a random person can’t eavesdrop), but not enough to prove things. messages themselves still aren’t authenticated by any one person.