Keychat's avatar
Keychat 1 year ago
Secure messaging needs to meet these five requirements as much as possible: 1. Anti-Forgery Anti-Forgery ensures that the sender of a message is verifiable and the message has not been tampered with. 2. End-to-End Encryption End-to-end encryption ensures that only the sender and receiver can decrypt and read the message content, protecting it from unauthorized access by servers or other network devices. 3. Forward Secrecy Forward secrecy ensures that even if the current key is compromised, historical messages cannot be decrypted, since each message uses a new encryption key, which is deleted after use. 4. Break-in Recovery Break-in Recovery ensures that if the current key is compromised, future messages cannot be decrypted, and the system can recover from the attack. This feature is also known as backward secrecy. 5. Metadata Privacy Protecting the privacy of communication involves more than just protecting the content of messages; it also includes protecting the identities of the communication parties and other data. View quoted note โ†’

Replies (8)

DZC's avatar
DZC 1 year ago
Nice summary of the requirements for secure and private messaging. Spoiler: It's not just E2EE!! ๐Ÿ˜ฒ
Keychat's avatar Keychat
Secure messaging needs to meet these five requirements as much as possible: 1. Anti-Forgery Anti-Forgery ensures that the sender of a message is verifiable and the message has not been tampered with. 2. End-to-End Encryption End-to-end encryption ensures that only the sender and receiver can decrypt and read the message content, protecting it from unauthorized access by servers or other network devices. 3. Forward Secrecy Forward secrecy ensures that even if the current key is compromised, historical messages cannot be decrypted, since each message uses a new encryption key, which is deleted after use. 4. Break-in Recovery Break-in Recovery ensures that if the current key is compromised, future messages cannot be decrypted, and the system can recover from the attack. This feature is also known as backward secrecy. 5. Metadata Privacy Protecting the privacy of communication involves more than just protecting the content of messages; it also includes protecting the identities of the communication parties and other data. View quoted note โ†’
View quoted note →
Keychat's avatar
Keychat 1 year ago
Thank you. We want to try a revenue model that relies solely on stamp income, without depending on donations. We believe this is a more sustainable and reasonable approach.
Keychat's avatar
Keychat 1 year ago
Thank you very much. I've added my Lightning Network address to my nostr profile. BTW, Keychat will support new service soon, and users can still pay per use with ecash sat.
What service will appear? Or is it a secret for now? You once mentioned storing data for a fee, maybe you will add this service. I would like to store data in cloud storage in encrypted form, paying for this service via eCash, and for the payment to be charged for the storage volume and for the storage time. I would also like to be able to restore/access stored data from another device by entering the seed phrase. Forgive me for being annoying!
โ†‘