Subj : Re: binkd crypt
To   : NuSkooler
From : tenser
Date : Thu Jan 04 2024 03:51 am

On 02 Jan 2024 at 07:27p, NuSkooler pondered and said...

Nu> tenser around Wednesday, January 3rd...
Nu>  Te> Oh, I don't know: incremental progress towards security as a goal may
Nu>  Te> slow, but is still progress, no?
Nu>
Nu> I'd argue that it's just a false sense of security, which can be worse
Nu> than none.

Perhaps.  It wouldn't protect against any number of other
attack vectors, but neither would a new protocol.  On the
other hand, if binkp regularly ran over TLS-protected
connections, it would be (largely) immune to passive sniffing.

Not that that matters much; I doubt the greater BBS community
is passing any traffic that _requires_ it.

Nu> If we were to implement a *new* protocol that is always encrypted, that
Nu> would be a better start -- only policy can prevent people from exposing
Nu> the messages elsewhere though + old setups will inherently be left out.

A way around that would be a proxy at the edge of that system's
local network that handles encryption.  It's not completely
end-to-end, but does it need to be?

--- Mystic BBS v1.12 A48 (Linux/64)
* Origin: Agency BBS | Dunedin, New Zealand | agency.bbs.nz (21:1/101)