Talk:Opportunistic encryption

From Wikipedia, the free encyclopedia
Jump to: navigation, search
WikiProject Cryptography / Computer science  (Rated C-class, Mid-importance)
WikiProject icon This article is within the scope of WikiProject Cryptography, a collaborative effort to improve the coverage of Cryptography on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
C-Class article C  This article has been rated as C-Class on the quality scale.
 Mid  This article has been rated as Mid-importance on the importance scale.
Taskforce icon
This article is supported by WikiProject Computer science (marked as Mid-importance).
 
WikiProject Computing / Networking / Software / Websites / Security (Rated C-class, Low-importance)
WikiProject icon This article is within the scope of WikiProject Computing, a collaborative effort to improve the coverage of computers, computing, and information technology on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
C-Class article C  This article has been rated as C-Class on the project's quality scale.
 Low  This article has been rated as Low-importance on the project's importance scale.
Taskforce icon
This article is supported by Networking task force (marked as Mid-importance).
Taskforce icon
This article is supported by WikiProject Software (marked as Mid-importance).
Taskforce icon
This article is supported by WikiProject Websites (marked as Mid-importance).
Taskforce icon
This article is supported by WikiProject Computer Security (marked as High-importance).
 

Thwaite Freemail[edit]

Thawte Freemail seems to no longer be available as of 2009-12-11. See http://www.thawte.com/resources/personal-email-certificates/index.html. "Thawte has discontinued Personal Email Certificates and the Web of Trust (WOT) certification system. For more information, please review our FAQ for the end of life of Web of Trust/Class One. We respect your privacy and encourage you to view our Privacy Statement for more information. Other certificate authorities, such as VeriSign, continue to offer email certificates to digitally sign and encrypt your personal digital communications. " — Preceding unsigned comment added by Dr.glen (talkcontribs)

BTNS[edit]

Opportunistic encryption involves using a key that might be known, and backing off to non-keyed when the key is not known. It has been mistakenly claimed similar to BTNS (Better Than Nothing Security), which is part of the Anonsec (Anonymous Security) framework by Joe Touch of USC/ISI. BTNS uses unsigned Diffie-Hellman exchanges to establish session keys between parties that have no shared keys or key framework. BTNS does not 'back-off'; in contrast to OE, BTNS allows a unsigned key pair to later be signed using in-band exchanges at other protocol layers, using a combination of Channel Binding and Connection Latching. OE has no relation to BTNS. —Preceding unsigned comment added by Jtouch (talkcontribs) 06:01, 19 January 2010 (UTC)

To the contrary, BTNS is a type of Opportunistic Encryption. Just because it has an additional capability of validating keys does not make the base mode not opportunistic. BTNS's base capability pretty much is the definition of OE, as it encrypts when the receiver is able. — Preceding unsigned comment added by 98.117.222.163 (talk) 00:57, 2 August 2012 (UTC)