<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://aznot.com/index.php?action=history&amp;feed=atom&amp;title=OpenWest_2015%2FEnd-to-end_Encrypted_Solutions</id>
	<title>OpenWest 2015/End-to-end Encrypted Solutions - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://aznot.com/index.php?action=history&amp;feed=atom&amp;title=OpenWest_2015%2FEnd-to-end_Encrypted_Solutions"/>
	<link rel="alternate" type="text/html" href="https://aznot.com/index.php?title=OpenWest_2015/End-to-end_Encrypted_Solutions&amp;action=history"/>
	<updated>2026-04-17T07:11:08Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.41.0</generator>
	<entry>
		<id>https://aznot.com/index.php?title=OpenWest_2015/End-to-end_Encrypted_Solutions&amp;diff=2169&amp;oldid=prev</id>
		<title>Kenneth at 22:51, 8 May 2015</title>
		<link rel="alternate" type="text/html" href="https://aznot.com/index.php?title=OpenWest_2015/End-to-end_Encrypted_Solutions&amp;diff=2169&amp;oldid=prev"/>
		<updated>2015-05-08T22:51:10Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;End-to-end Encrypted Solutions&lt;br /&gt;
&lt;br /&gt;
by Aaron Toponce (@AaronToponce)&lt;br /&gt;
&lt;br /&gt;
&amp;quot;In the light of the Edward Snowden revelations, I will explain the current landscape of end-to-end encrypted solutions to protect your data from the NSA. I&amp;#039;ll explain what the current threats are by the NSA and other well-funded organizations, what they likely can and cannot do, and how to mitigate them by using end-to-end encrypted software tools.&lt;br /&gt;
&lt;br /&gt;
Some of the tools covered will be OpenPGP, OTR, Bitmessage, d-note, and Tox. I&amp;#039;ll also talk about the NSA back doored Dual_EC_DRBG algorithm standardized by NIST, and the RDRAND controversy with Intel and Linux kernel developers. I&amp;#039;ll call into question some conspiracy theories about the NSA, which will involve Lavabit.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
CIA Triad&lt;br /&gt;
* Confidentiality&lt;br /&gt;
* Integrity&lt;br /&gt;
* Availability&lt;br /&gt;
&lt;br /&gt;
Information Security:&lt;br /&gt;
* Products (Physical Security)&lt;br /&gt;
* Procedures (Organizational Security)&lt;br /&gt;
* People (Personal Security)&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
* Communication&lt;br /&gt;
* Hardware&lt;br /&gt;
* Software&lt;br /&gt;
&lt;br /&gt;
Encryption - encoding information such that only authorized parties can read it.  Provides only confidentiality.&lt;br /&gt;
&lt;br /&gt;
Authentication - keeping information tamper-resistant while also proving it originated from the sender.  Provides only integrity.&lt;br /&gt;
&lt;br /&gt;
Matasano Challenges http://cryptopals.com&lt;br /&gt;
&lt;br /&gt;
Encrypt-then-MAC is the one true way&lt;br /&gt;
&lt;br /&gt;
MAC-then-Encrypt&lt;br /&gt;
* plaintext hashed&lt;br /&gt;
* mac appended to plaintext&lt;br /&gt;
* plaintext and mac encrypted&lt;br /&gt;
 * no ciphertext integrity&lt;br /&gt;
* plaintext integrity&lt;br /&gt;
* used in OpenSSL&lt;br /&gt;
&lt;br /&gt;
Cryptographic Doom Principle:&lt;br /&gt;
* Doom! when verifying the message is not the first execution&lt;br /&gt;
* MAC-then-Encrypt vulnerable to the padding oracle attack&lt;br /&gt;
* lucky thirteen and POODLE in OpenSSL&lt;br /&gt;
* mac-and-encrypt plaintext recovery attack in openssh up to 5.1&lt;br /&gt;
* mac-and-encrypt can reveal when messages repeat, if the mac doesn&amp;#039;t include a sequence number&lt;br /&gt;
&lt;br /&gt;
Suggestion:&lt;br /&gt;
* encrypt-then-mac&lt;br /&gt;
* use aes-gcm&lt;br /&gt;
* or chacha20-poly1305&lt;br /&gt;
* or aes-hmac-sha-256/512&lt;br /&gt;
* or aes-sha3 (not finalized by nist, yet)&lt;br /&gt;
&lt;br /&gt;
Off-the-Record Messaging (OTR)&lt;br /&gt;
* end to end encryption&lt;br /&gt;
* non-repudiation, off the record conversation, that is confidential&lt;br /&gt;
* good for journalists or whistleblowers&lt;br /&gt;
* Socialist Millionaire Protocol - a way to tell if the other person is who they are without actually identifying the other person&lt;br /&gt;
** ask a quesiton that only the other person knows&lt;br /&gt;
&lt;br /&gt;
OTR - Cryptocat&lt;br /&gt;
&lt;br /&gt;
OepnPGP - protocol / RFC (not an implementation)&lt;br /&gt;
* Unencumbered PGP&lt;br /&gt;
* PGP compatible without patents&lt;br /&gt;
* GNU Privacy Guard (GPG) - implementation&lt;/div&gt;</summary>
		<author><name>Kenneth</name></author>
	</entry>
</feed>