Re: [tor-dev] A new idea for email encryption on tor

2021-03-28 Thread Keifer Bly
Well, you do. It is stored on your local machine only. --Keifer On Wed, Dec 2, 2020 at 1:10 PM Wisdom With Rahul wrote: > This idea is interesting but who owns all the keys? > > Thanks and regards! > > > > > On Fri 13 Nov, 2020, 6:49 AM Keifer Bly, wrote: > >> Well, the mechanism is that it ov

Re: [tor-dev] A new idea for email encryption on tor

2020-12-09 Thread Dmitry Khutornoy
Hey, I left some comments on the video, I am not a Tor developer but I think I made some valid points, please respond to them Thanks and Regards On Wed, Dec 2, 2020 at 4:10 PM Wisdom With Rahul wrote: > This idea is interesting but who owns all the keys? > > Thanks and regards! > > > > > On Fri

Re: [tor-dev] A new idea for email encryption on tor

2020-12-02 Thread Wisdom With Rahul
This idea is interesting but who owns all the keys? Thanks and regards! On Fri 13 Nov, 2020, 6:49 AM Keifer Bly, wrote: > Well, the mechanism is that it overwrites the key ever time, so each > message has its own unique key, also the receiver needs to verify the key > file with the built in

Re: [tor-dev] A new idea for email encryption on tor

2020-11-12 Thread Keifer Bly
Well, the mechanism is that it overwrites the key ever time, so each message has its own unique key, also the receiver needs to verify the key file with the built in tool to be able to use it. So an attacker does not know this the only way to get this information is from the person that created the

Re: [tor-dev] A new idea for email encryption on tor

2020-11-12 Thread Santiago Torres-Arias
On Thu, Nov 12, 2020 at 11:19:44AM -0800, Keifer Bly wrote: > Hi there, Hello, > So I have a new email encryption system which requires that the user has > the specific key file generated for a message rather than the password, > specifically this software generates a unique key file for a specif

[tor-dev] A new idea for email encryption on tor

2020-11-12 Thread Keifer Bly
Hi there, So I have a new email encryption system which requires that the user has the specific key file generated for a message rather than the password, specifically this software generates a unique key file for a specific message every time a message is created. The user then enters the date an