-
Notifications
You must be signed in to change notification settings - Fork 58
What is or is not PFS-protected? #186
Comments
E3X Messages are not PFS. After compromising the private keys the attacker can decrypt any Message. Obviously compromised keys can still be used to pose as the original peer allowing an attacker to decrypt/encrypt new channel packets (after negotiating a new exchange). I believe this illustrates the situation. |
I get PFS in general, but yes you answered my question, thanks. Relatedly, is there a really simple breakdown of the Telehash jargon
|
There is the glossary but it doesn't sound like what you're asking for, there's been a couple attempts at having some visuals to help explain the roles/flows but none cleaned up enough to be helpful yet. Channels are the primary data transport, messages are primarily used just for handshakes to help set-up channels and store-and-forward patterns where there is no reverse channel possible. Keep asking questions and filing issues though, that'll help pull out more detail :) |
From telehash.org/v3/spec/v3.0.0-stable.pdf --
Does this merely mean that setting up the synchronous crypto channel uses PFS, or that each message within that channel has PFS? Thanks!
The text was updated successfully, but these errors were encountered: