uses additional crypto mechanisms
> to ensure that all data (including the public keys) associated with names
> registered with CONIKS key servers isn't stored in plain.
>
> I hope this helps!
> Best,
> Marcela
>
> On Apr 20, 2016, at 14:28, Go wrote:
>
> Hi,
>
the attacker won’t be able to see that you used Tor
> Messenger from the mere fact that you use a certain identity provider, even
> if he still could recompute your user-name from the directory.
>
> Hope that helps?
> Ismail
>
>
> On 19 Apr 2016, at 21:28, Go wrote:
>
>
Hi,
CONIKS seems to be a very useful system. Just curious: do Tor messenger
users need to hand out their real identities (facebook account, twitter
account, etc.) to CONIKS servers? If so it seems dangerous to put all the
identities in a centralized service. If the CONIKS servers have been
compro