Talk:Off-the-Record Messaging

From Wikipedia, the free encyclopedia
Jump to: navigation, search

Move to "Off-the-Record Messaging" (caps)[edit]

I think the article should be moved back to a capitalized title, "Off-the-Record Messaging", as the article documents a specific encryption protocol, not "off the record messaging" in general; "Off-the-Record" is merely a name. All official sources also capitalize the name. Any agreements/disagreements? -- intgr 09:11, 30 January 2007 (UTC)

You are right. --Liebeskind 19:47, 31 January 2007 (UTC)

OTR - Deniable encryption?[edit]

As far as I can tell, OTR doesn't have deniable encryption, just deniable authentication. I think the article intro should be changed in accordance with the Implementation section, which has it correct. Unless, of course, a cryptographer can explain otherwise. — metaprimer (talk) 12:48, 16 September 2007 (UTC)

It has malleable encryption (explained on the deniable encryption page), so i changed it —Preceding unsigned comment added by (talk) 18:30, 18 October 2008 (UTC)

The way I understand it, the message signature proves (to anyone who can decrypt the message) that either Alice or Bob sent it. Bob knows that he didn't send the message, so it must have been Alice, but anyone else can't know whether the message was really sent by Alice or forged by Bob. Is this correct / useful? Gingekerr (talk) 22:38, 11 February 2014 (UTC)

Rewritten explanation[edit]

Instead of complicated computer jargon, I tried to explain the difference between OTR and ordinary cryptography software using a picture of signed writing v. private conversation. Seems more understandable to me. Ceplm (talk) 21:17, 13 March 2008 (UTC)

Further implementations[edit]

These two implementations are not yet stable but will become so. I don't know how to best insert this into the article conforming to Wikipedia standards, since this is no "install and use" kind of software yet. I consider it important, because these two are the most popular and feature rich jabber clients (note I have no hard evidence, though). -- (talk) 21:15, 25 May 2008 (UTC)

OTR support for Plugin was rewritten as a plugin. Adding Gajim to the list. SzpakEng (talk) 22:10, 7 March 2012 (UTC)

I have been using Gajim 0.15 for a logn time, but there is only beta4 available. I comment Gajim waiting for the final reelase. SzpakEng (talk) 22:16, 7 March 2012 (UTC)

Example picture[edit]

Somehow I do not understand the example picture, there are 2 windows on one machine (they have a common background) and they should be the same conversation - one "normal" the other "raw". But why is in the raw only macskeeball speaking, and why are there 6 messages and in the normal only 2 from him and 3 from "me"

If these 6 encrypted messages are the 2+3 messages from both, why is the first message from "me" also encrypted? it should be still plain. -- (talk) 22:00, 3 September 2009 (UTC)

majority of cryptography tools indicate topic?[edit]

Quoting from the 2nd paragraph: "This is in contrast with the majority of cryptography tools which resemble more a signed writing on paper, which can be later used as a record to demonstrate the communication event, the participants, and the topic of communication."

I am skeptical of the claim that the topic is recorded. Can anyone explain? (talk) 21:33, 2 March 2011 (UTC)

The topic isn't recorded but it could be used to surmise evidence. For example, if a suspected terrorist has their hard drive seized, encrypted communications found on it could be used in court as evidence suggestive of plotting, especially if the date and other participants are also suggestive... I've changed it to "possible evidence of the topic of communication." ··gracefool 01:19, 12 May 2011 (UTC)

origin of the name[edit]

Why is this called "Off-the-Record Messaging"? --Gaborgulya (talk) 21:15, 1 May 2013 (UTC)

Its name is a reference to a convention in journalism. Say a politician wants to discuss something controversial with a journalist, without being recorded, transcribed, or having what he says published. He first requests to speak "off the record". It's a matter of convention, which has existed for many decades before OTR Messaging was invented, but journalists generally hold conventions pretty high. There are exceptions, though.
It's "off-the-record" because, after the conversation has taken place, it can't be proven that any single person has sent any single message, because they might have just as well been forged (see how the article describes 'deniable authentication'). Another reason it might be called 'off-the-record' is because there is, in most scenarios, no central authority that keeps record of the cleartext messages as they arrive. That's because of the perfect forward secrecy - the server relaying the message can't see what's being said. Even if a key were to be found, previous conversations would not be compromised. One key is used for each message.
In this way, nobody can know what is being said, apart from the participants in the conversation. After the conversation happens, and one party leaks the conversation, it's not possible to pin what was said in the conversation on any party, because the messages might as well have been forged, because it's possible to do so with the deniable authentication.
All this is already mentioned in the article. --BurritoBazooka (talk) 01:36, 9 May 2013 (UTC)

OTR in Kopete[edit]

Information about OTR in Kopete should be reviewed. References [10], [11] and [12] are no more relevant. (talk) 14:14, 4 July 2013 (UTC)

IM Plus supports OTR[edit]

IM Plus supports OTR, mentioned eg. here:
Android (free): Android paid: iOS:

I have tried the Android version. Cannot comment on other platforms at the moment.

IM Plus appears to be completely ignored in all instant messaging articles here for some reason.

"Authentication" is bad title[edit]

Mutual Authentication is not Authentication. After SMP, you cannot verify you are talking to the person you think you are. You can just be sure there is no third party in between. For example, Alice and Bob have a conversation. Cary wants to use man in the middle. After SMP, Alice and Bob can be sure no one is in the middle relaying the message. But Cary can still attack Alice and do a SMP with Alice alone, and pretend to be Bob, without relaying the message. — Preceding unsigned comment added by Lesiw (talkcontribs) 13:44, 7 May 2015 (UTC)

@Lesiw: Alice is supposed to pick a question/answer that only Bob knows. And since Cary doesn't know those secrets, they can't complete a successful authentication. How is this not authentication? -- intgr [talk] 07:45, 8 May 2015 (UTC)

External links modified[edit]

Hello fellow Wikipedians,

I have just added archive links to one external link on Off-the-Record Messaging. Please take a moment to review my edit. If necessary, add {{cbignore}} after the link to keep me from modifying it. Alternatively, you can add {{nobots|deny=InternetArchiveBot}} to keep me off the page altogether. I made the following changes:

When you have finished reviewing my changes, please set the checked parameter below to true to let others know.

You may set the |checked=, on this template, to true or failed to let other editors know you reviewed the change. If you find any errors, please use the tools below to fix them or call an editor by setting |needhelp= to your help request.

  • If you have discovered URLs which were erroneously considered dead by the bot, you can report them with this tool.
  • If you found an error with any archives or the URLs themselves, you can fix them with this tool.

If you are unable to use these tools, you may set |needhelp=<your help request> on this template to request help from an experienced user. Please include details about your problem, to help other editors.

Cheers.—cyberbot IITalk to my owner:Online 09:27, 11 January 2016 (UTC)