-
-
Notifications
You must be signed in to change notification settings - Fork 778
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
New Feature OpenPGP.js #3219
Comments
Agree. I heard OMEMO has vulnerabilities |
@tomfun link to this study/report/research/proof of vulnerabilities please? |
Sorry, I hadn't checked it before. My friend said it to me. My research shows this:
As you may see, if there is trusted pgp public key storage, or your friend sent a keys to you (by trusted channel) PGP is secure. My further research showed me that OMEMO is better if we talk about PGP without refreshed keys. PGP support encryption for multiple receivers (but it is a problem if count is big for traffic!). But anyway the security of a group chat is as strong as its weakest link - and for XMPP it is problem because of: managing an OMEMO-based system's security can be intricate because of various keys for different accounts, different XMPP clients, versions, plugins, and operating systems might all contribute to potential security risks. We can only keep all these components updated. So PGP is not so bad and have a big history (32 years !). My notes on the topic https://gist.github.com/tomfun/83369d8302972915e58a0c4b21273ca6 |
OpenPGP is much more better, it supports offline encryption, PGP is tested over the years, tested by thousands of researchers. OMEMO is young protocol, did not have security tests and third-party audit (did not meet any serious extensive research). Only https://conversations.im/omemo/audit.pdf but this is biased, this is not a third-party audit. OMEMO and OTR both are vulnerable to man-in-the-middle attacks. OMEMO same as OTR is fully useless and could be compromised if xmpp server is compromised. Xmpp isn't decentralized, so any xmpp may be compromised any time. |
You can enable only trusted devices, so MITMs are useless |
Could you point or quote what exactly you want to share?
|
Hi. New Feature suggestion - to implement PGP in conversejs.
It's much more secure than OMEMO and more secure as old-dated OTR
OpenPGP implementation for JavaScript
https://github.com/openpgpjs/openpgpjs
The text was updated successfully, but these errors were encountered: