Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Key Compromise Impersonification #2

Open
ghost opened this issue Mar 24, 2017 · 0 comments
Open

Key Compromise Impersonification #2

ghost opened this issue Mar 24, 2017 · 0 comments

Comments

@ghost
Copy link

ghost commented Mar 24, 2017

A known vulnerability of most handshakes (like Signal's) which allows the bearer of private keys to impersonate anyone to the original owner of that key. This is a very serious problem.

First: Does Olm have that vulnerability?

I came across this in a very interesting protocol, the 'Secret Handshake' or shs.
Github
Design Paper

It bring forward an interesting concept: To enable developers to think of private and public keys as access rights. This is a very powerful concept, which is defeated by the KCI vulnerability.

Edit: Fixed mistake. Latin background playing tricks with me.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

0 participants