aboutsummaryrefslogtreecommitdiffstats
path: root/doc/encryption.bb
diff options
context:
space:
mode:
authorRedSwede <redswede@riseup.net>2015-01-17 00:19:22 +0100
committerRedSwede <redswede@riseup.net>2015-01-17 00:19:22 +0100
commit1d7bd0ba909241bc4a3b423dbae82ff64e928bd3 (patch)
tree339989866daad4ff4c66a88472351a22ad972a79 /doc/encryption.bb
parentd5c85ea1bcd8b610f3fce8660d82a9a1265fae67 (diff)
downloadvolse-hubzilla-1d7bd0ba909241bc4a3b423dbae82ff64e928bd3.tar.gz
volse-hubzilla-1d7bd0ba909241bc4a3b423dbae82ff64e928bd3.tar.bz2
volse-hubzilla-1d7bd0ba909241bc4a3b423dbae82ff64e928bd3.zip
Looked through the whole doc/-folder more or less. Added and commented a few things here and there.
One question: * Is the crypto-js E2EE or not? If the devs agree that it is NOT then I propose removing this from the help files and gui.
Diffstat (limited to 'doc/encryption.bb')
-rw-r--r--doc/encryption.bb10
1 files changed, 5 insertions, 5 deletions
diff --git a/doc/encryption.bb b/doc/encryption.bb
index 3eee7a452..427c5f96b 100644
--- a/doc/encryption.bb
+++ b/doc/encryption.bb
@@ -1,4 +1,4 @@
-[size=large]Builtin Automatic Encryption Plus Super-Safe Encryption[/size]
+[size=large]Builtin Automatic Encryption[/size]
Full disclosure: The encryption Red Matrix uses per default is not absolutely waterproof. There [i]are[/i] known procedures to circumvent it. [i]But[/i] this takes a lot of effort and needs to be done individually for each channel. And to make this clear: Other services store your messages in plaintext, therefore we regard this approach as a [i]significant[/i] improvement for your privacy. Plus you are always free to use further encryption and password protection if you so desire.
@@ -6,11 +6,11 @@ To explain this in more detail:
- each channel has its key pair
- every non-public post is automatically encrypted
-- optional password protected super-safe encryption (needs to be enabled in settings)
+- optional password protect content via crypto-javascript browser-to-browser encryption (needs to be enabled in settings) Full disclosure: A rogue hub admin could injects malicious javascript-code (e.g. keylogging-abilities) into the code. Encrypt our stuff out of band with GPG, become a hub administrator yourself or use other means of communication if this worries you.
So what is the scope of security? Full disclosure: This might be great, but it is not perfect.
-- every non-public post is automatically encrypted but persons who have access to the site's database and files [i]may[/i] be able to decrypt everything by usig these keys which obviously need to be stored on the server. To be clear: The encrypion keys are different for every channel and it is [i]quite an effort[/i] to do this. And again: Other services store your messages in plain text unencrypted. So this [i]is[/i] quite a significant win for your privacy.
-So if you require super tight encryption enable ... and protect your posting with a password only you and the adressee(s) know. This way even people with access to the database and server ...
+- every non-public post is automatically encrypted but persons who have access to the site's database and files [i]may[/i] be able to decrypt everything by using these keys which obviously need to be stored on the server. To be clear: The encrypion keys are different for every channel and it is [i]quite an effort[/i] to do this. And again: Other services store your messages in plain text unencrypted. So this [i]is[/i] quite a significant win for your privacy.
+We believe that the NSA-level dragnet plaintext extracting mass surveillance is probably not possible due to the design of the zot protocol. Dedicated attacks including hacking into one hub to obtain the server logs and database only partly reveal what is going on between people communication between different hubs. We believe that this makes it much more expensive for state-level attackers to access your content in Red Matrix.
-... needs to be written ...
+We gladly accept help improving the security of the system and auditing it as well.