Talk:Off-the-record messaging
This is the talk page for discussing improvements to the Off-the-record messaging article. This is not a forum for general discussion of the article's subject. |
Article policies
|
Find sources: Google (books · news · scholar · free images · WP refs) · FENS · JSTOR · TWL |
This article has not yet been rated on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | |||||||||||||||||||||||||||||||||||||||||||
Please add the quality rating to the {{WikiProject banner shell}} template instead of this project banner. See WP:PIQA for details.
Please add the quality rating to the {{WikiProject banner shell}} template instead of this project banner. See WP:PIQA for details.
Please add the quality rating to the {{WikiProject banner shell}} template instead of this project banner. See WP:PIQA for details.
|
Move to "Off-the-Record Messaging" (caps)
I think the article should be moved back to a capitalized title, "Off-the-Record Messaging", as the article documents a specific encryption protocol, not "off the record messaging" in general; "Off-the-Record" is merely a name. All official sources also capitalize the name. Any agreements/disagreements? -- intgr 09:11, 30 January 2007 (UTC)
You are right. --Liebeskind 19:47, 31 January 2007 (UTC)
OTR - Deniable encryption?
As far as I can tell, OTR doesn't have deniable encryption, just deniable authentication. I think the article intro should be changed in accordance with the Implementation section, which has it correct. Unless, of course, a cryptographer can explain otherwise. — metaprimer (talk) 12:48, 16 September 2007 (UTC)
It has malleable encryption (explained on the deniable encryption page), so i changed it —Preceding unsigned comment added by 131.111.243.37 (talk) 18:30, 18 October 2008 (UTC)
Rewritten explanation
Instead of complicated computer jargon, I tried to explain the difference between OTR and ordinary cryptography software using a picture of signed writing v. private conversation. Seems more understandable to me. Ceplm (talk) 21:17, 13 March 2008 (UTC)
Further implementations
- For Gajim (http://gajim.org/) OTR support has been introduced in the development version (http://trac.gajim.org/wiki/OTR) and will probably soon be availiable with a coming release.
- For Psi there exists a plugin: http://public.tfh-berlin.de/~s717689/ Currently you need to patch Psi, but this will allegedly vanish with continuing development of the plugin interface.
These two implementations are not yet stable but will become so. I don't know how to best insert this into the article conforming to Wikipedia standards, since this is no "install and use" kind of software yet. I consider it important, because these two are the most popular and feature rich jabber clients (note I have no hard evidence, though). --141.84.69.20 (talk) 21:15, 25 May 2008 (UTC)
OTR support for Plugin was rewritten as a plugin. http://gajim-otr.pentabarf.de/ Adding Gajim to the list. SzpakEng (talk) 22:10, 7 March 2012 (UTC)
I have been using Gajim 0.15 for a logn time, but there is only beta4 available. I comment Gajim waiting for the final reelase. SzpakEng (talk) 22:16, 7 March 2012 (UTC)
Example picture
Somehow I do not understand the example picture, there are 2 windows on one machine (they have a common background) and they should be the same conversation - one "normal" the other "raw". But why is in the raw only macskeeball speaking, and why are there 6 messages and in the normal only 2 from him and 3 from "me"
If these 6 encrypted messages are the 2+3 messages from both, why is the first message from "me" also encrypted? it should be still plain. --147.142.13.23 (talk) 22:00, 3 September 2009 (UTC)
majority of cryptography tools indicate topic?
Quoting from the 2nd paragraph: "This is in contrast with the majority of cryptography tools which resemble more a signed writing on paper, which can be later used as a record to demonstrate the communication event, the participants, and the topic of communication."
I am skeptical of the claim that the topic is recorded. Can anyone explain? 68.33.193.71 (talk) 21:33, 2 March 2011 (UTC)
- The topic isn't recorded but it could be used to surmise evidence. For example, if a suspected terrorist has their hard drive seized, encrypted communications found on it could be used in court as evidence suggestive of plotting, especially if the date and other participants are also suggestive... I've changed it to "possible evidence of the topic of communication." ··gracefool☺ 01:19, 12 May 2011 (UTC)
origin of the name
Why is this called "Off-the-Record Messaging"?
- Start-Class Computing articles
- Unknown-importance Computing articles
- All Computing articles
- Start-Class law articles
- Unknown-importance law articles
- WikiProject Law articles
- Start-Class Cryptography articles
- Unknown-importance Cryptography articles
- Start-Class Computer science articles
- Unknown-importance Computer science articles
- WikiProject Computer science articles
- WikiProject Cryptography articles