Modern XMPP project discussion - 2025-01-29


  1. Kris

    https://www.kaidan.im/2022/08/31/e2ee-trust-management/

  2. Kris

    But that is a bit controversial and personally I am not a big fan of this idea.

  3. leke

    1

  4. leke

  5. fugata

    2

  6. Arlington Hughes

    > I, for example, use Conversations and Dino. Conversations wants to have a QR code scannned to verify a key, Dino does not provide that. I can only accept the key in Conversations, it seems. Dino does, in fact, have a scannable OMEMO QR code. Assuming you're using the latest build, go to Preferences, click Encryption, and click the icon immediatley to the left of your key.

  7. Arlington Hughes

    Excuse me, I meant the icon immediatly to the *right* of the key.

  8. Arlington Hughes

  9. raucao

    for me, that's in accounts, not preferences

  10. Arlington Hughes

    Yeah, I think that was a recent commit (definitely within the last year).

  11. erebion

    > Dino does, in fact, have a scannable OMEMO QR code. Assuming you're using the latest build, go to Preferences, click Encryption, and click the icon immediatley to the left of your key. Only for the current device. Meaning everytime I log in on a new device, I have to open DIno on all four devices to scan the QR code, which is painful.

  12. Kris

    well that's kind of intentional as you are trusting the device not the account

  13. Kris

    but see the link I shared above for a possible alternative that is already implemented in some clients

  14. erebion

    > but see the link I shared above for a possible alternative that is already implemented in some clients I wonder whether Dino and Conversations will adopt that. It's extremelt helpful to me.

  15. Kris

    Maybe, but I think the Conversation dev said its too comicated or so.

  16. Kris

    But you realize that there is no real need to verify devices, right?

  17. Kris

    Unless you want to be extra sure about a specific device you can just use the default trust on first use and e2ee will work fine.

  18. erebion

    There is a real need, I know my own threat model, thanks.

  19. Kris

    If you outsource trust to the other person like the above method does, you might as well not verify devices as all imho.

  20. erebion

    My threat model obviously does not fit your idea.

  21. Kris

    I am not sure you thought your trust model through though 🤷‍♂️

  22. Kris

    But anyways, you do you

  23. erebion

    An XMPP server getting hacked, the protection being E2EE? I'm pretty sure I know what I want to prptect myself agsinst.

  24. Kris

    E2ee is not effected by what I said.

  25. erebion

    E2EE only really helps in that scenario if you know who you are encrypting for.

  26. Kris

    Trust on first use does that as well

  27. erebion

    Anyway, will talk to the Dino folks to get their view on this.

  28. erebion

    No, it does not.

  29. Kris

    About as well as letting the other side add arbitrary devices to your trusted devices list without you knowing.

  30. erebion

    Thanks, next please tell me what the internet is as I obviously have no idea about it all...

  31. erebion

    🙄

  32. erebion

    I actually do understand what cross signing of keys does and how it *helps* me with my use-case.

  33. Kris

    looks like a case of Dunning-Kruger effect 🫠️

  34. erebion

    The effect which has recently been debunked? I doubt any such case would indeed exist.

  35. erebion

    https://www.sciencedirect.com/science/article/abs/pii/S0160289620300271

  36. Kris

    👍️

  37. erebion

    Oh wow, how quickly the years do pass...

  38. erebion

    > For instance if you were to order a bottle of whisky online, you could use a did to verify you are over 18 but not what age you are or where you were born The German ID card does something line that. I always wondered what kind of obscure magic would be at work there.

  39. erebion

    *like that

  40. Kris

    GNU Taler is working on something like that: https://docs.taler.net/design-documents/024-age-restriction.html

  41. MaxSan

    >> For instance if you were to order a bottle of whisky online, you could use a did to verify you are over 18 but not what age you are or where you were born > The German ID card does something line that. I always wondered what kind of obscure magic would be at work there. Its not going to be the same, unless it's doing cryptographic magic on an open client how can third parties do this, and who accepts it