- Aug 22, 2016
-
-
akwizgran authored
This allows simpler server-side code, and a failure part-way through sending won't require restarting from the beginning next time.
-
- Apr 21, 2016
-
-
str4d authored
-
- Apr 20, 2016
-
-
str4d authored
Will currently fail at runtime; requires a public key and a server onion.
-
- Mar 30, 2016
-
-
akwizgran authored
-
- Mar 26, 2016
-
-
str4d authored
-
- Feb 02, 2016
- Jan 20, 2016
-
-
akwizgran authored
-
- Dec 14, 2015
-
-
akwizgran authored
-
- Jan 09, 2015
-
-
akwizgran authored
-
- Jan 06, 2015
-
-
akwizgran authored
-
- Dec 29, 2014
-
-
akwizgran authored
1. The things we're really trying to protect - contact identities, message contents, etc - can't be erased from memory because they're encapsulated inside objects we don't control. 2. Long-term secrets can't be protected by erasing them from memory because they're stored in the database and the database key has to be held in memory whenever the app's running. 3. If the runtime uses a compacting garbage collector then we have no way to ensure an object is erased from memory. 4. Trying to erase secrets from memory makes the code more complex. Conclusion: Let's not try to protect secrets from an attacker who can read arbitrary memory locations.
-
- Nov 04, 2014
-
-
akwizgran authored
-
- Oct 08, 2014
-
-
akwizgran authored
-
- Jan 08, 2014
-
-
akwizgran authored
-
- Dec 19, 2013
-
-
akwizgran authored
Private messages are now the same as group messages, but groups can be private or public. When a contact is added, a private group is created and designated as the inbox for exchanging private messages with the contact.
-
- Jun 17, 2013
-
-
akwizgran authored
-
- Jun 14, 2013
-
-
akwizgran authored
-
- Apr 30, 2013
-
-
akwizgran authored
Android doesn't currently store bundles persistently, so it's premature to protect against accidental information leaks through persistent bundle storage. Protecting against deliberate information leaks by the OS is probably futile, so there's currently no need for bundle encryption.
-
- Apr 16, 2013
-
-
akwizgran authored
-
- Mar 29, 2013
-
-
akwizgran authored
The invitation and private messaging UIs are currently broken. Some key rotation bugs were fixed; others may have been created (unit tests needed). An encoding for private keys was added. Pseudonyms were moved out of the messaging package and ratings were moved in.
-
- Feb 19, 2013
-
-
akwizgran authored
-
- Feb 18, 2013
-
-
akwizgran authored
Only the bundle contents created by Briar classes are encrypted.
-
- Dec 05, 2012
- Nov 13, 2012
- Nov 12, 2012
-
-
akwizgran authored
-
- Oct 30, 2012
-
-
akwizgran authored
-
- Oct 24, 2012
-
-
akwizgran authored
-
- Sep 23, 2012
-
-
akwizgran authored
-
- Aug 28, 2012
-
-
akwizgran authored
-
- May 24, 2012
-
-
akwizgran authored
This makes us Suite B compliant and saves 32 bytes per frame. The AES/GCM implementation refuses to decrypt the frame header before checking the MAC, so we have to use AES/CTR to peek at the header. The header is still covered by the MAC, and we still check it after peeking!
-
- Apr 28, 2012
-
-
akwizgran authored
-
- Mar 29, 2012
-
-
akwizgran authored
CryptoComponentImpl needs some unit tests.
-
- Feb 24, 2012
-
-
akwizgran authored
-
- Feb 23, 2012
-
-
akwizgran authored
-
- Feb 06, 2012
-
-
akwizgran authored
consequent distinction between segments and frames.
-
- Jan 17, 2012
-
-
akwizgran authored
-