Post AvXU8CGZyvv9hm6RpA by [email protected] | |
More posts by [email protected] | |
Post #AvXT1YrHUGRDn8Xf9M by [email protected] | |
0 likes, 0 repeats | |
I proposed a way to incorporate Sender Authentication in age with the following… | |
Post #AvXT1Z0qug5uGp1J4K by [email protected] | |
0 likes, 1 repeats | |
@soatok Your scheme doesn't provide key compromise impersonation resistance… | |
Post #AvXU8CGZyvv9hm6RpA by [email protected] | |
0 likes, 0 repeats | |
@abacabadabacaba Yeah, I know. It's not a goal AFAIK.If you wanted KCI, you… | |
Post #AvXU8CO1XFsM4raOQa by [email protected] | |
0 likes, 1 repeats | |
@soatok Or you can use actual signatures. But to use them with age's requir… | |
Post #AvXVQVlaJs9nLlu0uW by [email protected] | |
0 likes, 0 repeats | |
@abacabadabacaba Maybe nothttps://eprint.iacr.org/2025/554 | |
Post #AvXVQVrxw9GFfYt6rA by [email protected] | |
0 likes, 1 repeats | |
@soatok I believe that symmetric encryption and digital signatures can be compo… | |
Post #AvXlG5TOoyMwApRom0 by [email protected] | |
0 likes, 1 repeats | |
@abacabadabacaba @soatok yeah, I’d second the idea to explicitly not allow mu… | |
Post #AvYwPlHE3hsf5MWroG by [email protected] | |
0 likes, 1 repeats | |
@thad @abacabadabacaba @soatok see this old blog post of mine for a discussion … | |
Post #AvZ9iGsyZj5njeLKFM by [email protected] | |
0 likes, 1 repeats | |
@neilmadden @thad @soatok The solution posted there seems to be incompatible wi… | |
Post #AvZAdePDnhORBhmnqK by [email protected] | |
0 likes, 1 repeats | |
@abacabadabacaba @thad @soatok well, incompatible with streaming encryption, no… | |
Post #AvZBNXPc8R9komqmwK by [email protected] | |
0 likes, 1 repeats | |
@neilmadden @thad @soatok But streaming encryption and decryption are both impo… | |
Post #AvZCQBY1yxN9pXc6Vc by [email protected] | |
0 likes, 1 repeats | |
@abacabadabacaba @thad @soatok I don’t think it’s an insurmountable problem… | |
Post #AvZD6fo3s7Gvq1N6Bc by [email protected] | |
0 likes, 1 repeats | |
@neilmadden @thad @soatok Insider truncation attacks aren't much different … |