- Dec 08, 2015
-
-
Ernir Erlingsson authored
-
- Dec 04, 2015
-
-
akwizgran authored
-
- Dec 03, 2015
- Dec 02, 2015
- Nov 30, 2015
- May 02, 2015
- May 01, 2015
-
-
akwizgran authored
This breaks backward compatibility for the wire protocol and messages stored in the database. The database schema version has been incremented.
-
- Apr 29, 2015
-
-
akwizgran authored
-
- Apr 03, 2015
-
-
akwizgran authored
-
- Jan 14, 2015
- Jan 09, 2015
- Jan 06, 2015
-
-
akwizgran authored
-
- Jan 05, 2015
- Dec 29, 2014
-
-
akwizgran authored
1. The things we're really trying to protect - contact identities, message contents, etc - can't be erased from memory because they're encapsulated inside objects we don't control. 2. Long-term secrets can't be protected by erasing them from memory because they're stored in the database and the database key has to be held in memory whenever the app's running. 3. If the runtime uses a compacting garbage collector then we have no way to ensure an object is erased from memory. 4. Trying to erase secrets from memory makes the code more complex. Conclusion: Let's not try to protect secrets from an attacker who can read arbitrary memory locations.
-
akwizgran authored
-
- Dec 14, 2014
- Dec 13, 2014
-
-
akwizgran authored
DuplexOutgoingSession flushes its output stream if it's idle for a transport-defined interval, causing an empty frame to be sent. The TCP and Tor plugins use a socket timeout equal to twice the idle interval to detect dead connections. See bugs #27, #46 and #60.
-
- Nov 25, 2014
-
-
akwizgran authored
-
- Nov 08, 2014
- Nov 06, 2014
- Nov 05, 2014
- Nov 04, 2014