- Joined
- Sep 29, 2018
Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
LMAO does anybody have that Cowboy clowns DMs im sure he has some gold
So you encrypt the DM key with another key, call the key for that the KEK (key encryption key). The KEK is derived from the user's password and never touches the server. The user downloads the encrypted blob containing the key for their DMs, they decrypt it to get the DM key, they request the encrypted blob from the server, and then they decrypt their DMs. That way plaintext DMs aren't stored on the server.> Have messages encrypted on the server
> In order to make them readable to the user, server needs to decrypt them
> Key for decrypton is stored on the server
> Server gets compromised
or just go outside and talk in real lifeSo you encrypt the DM key with another key, call the key for that the KEK (key encryption key). The KEK is derived from the user's password and never touches the server. The user downloads the encrypted blob containing the key for their DMs, they decrypt it to get the DM key, they request the encrypted blob from the server, and then they decrypt their DMs. That way plaintext DMs aren't stored on the server.
When they need to reset their password, they download the encrypted DM key, decrypt it with the key derived from their old password, encrypt it with the key derived from their new password, and upload that along with the password change request.
Ideally DMs would be E2EE, not just encrypted at rest, but that would require getting all the different fediverse server implementations to play nicely.
I hope this is the end for it like it was for chudbuds and graf dies on the streets lmao
Good idea.So you encrypt the DM key with another key, call the key for that the KEK (key encryption key). The KEK is derived from the user's password and never touches the server. The user downloads the encrypted blob containing the key for their DMs, they decrypt it to get the DM key, they request the encrypted blob from the server, and then they decrypt their DMs. That way plaintext DMs aren't stored on the server.
When they need to reset their password, they download the encrypted DM key, decrypt it with the key derived from their old password, encrypt it with the key derived from their new password, and upload that along with the password change request.
Ideally DMs would be E2EE, not just encrypted at rest, but that would require getting all the different fediverse server implementations to play nicely.
If he isn't one of these its not leaked or already swept up.LMAO does anybody have that Cowboy clowns DMs im sure he has some gold
i think Cowboy 1488 is himIf he isn't one of these its not leaked or already swept up.
No, they only let DMs get leaked. Which, if you weren't being a degenerate Discord fag weirdo on the platform actually seems to mean that you've been unaffected by the hack, at least for now.Literally fuck this piece of shit website I could barely tolerate the content in there and now they let everyone's information get leaked?!
I get mad at my cat when he insists on invading my personal workspace and lying on my keyboard. Just sayin'; even you cats are not immune. Take note.That's why I'm Cats, that's why I only ever post cats and send people photographs of cats. you can't get mad at a cat. you can't be embarrassed by sending a cat.
That's basically how PGP works. You have a public/private key pair. To send data, you generate a random symmetric key, encrypt it with the receiver's public key, send the encrypted data and encrypted key over the wire. Then they decrypt the symmetric key using their private key and use that to decrypt the message. It's a bit more complicated than what you described but orders of magnitude more efficient. Public key cryptography is really slow compared to symmetric algorithms like AES.Good idea.
Do you even need a 2nd key with this approach? Just generate the private key on the fly whenever needed from the password, but put the public one out there for everyone to encrypt messages sent to you.
The number of people hitting on Elaine is depressing.He sent this to Elaine (trollcow) View attachment 5136846and he asked Graf how to get a checkmark and was ignored by both.![]()