RFree Cryptography

Cryptography, security

2015-03-05 Contact

March 06, 2015 — R. Freeman

If you wish to contact me, then this are some of the options.

By the way I written a small summary of security of various communication methods.

Concerning:

  • privacy - can anyone find out that we communicated, and what we talked about.
  • distribution - can communication be blocked by attacking/forcing some server(s).
  • auth - can recipient be sure that given sender was in fact saying given things.

Ways to reach me:

  • i2p-bote distribute private email to the address (EC-521 encryption) FREfg~bO..O4Ks given below (and PGP encrypted).
  • i2p-bote distribute private email to the address (NTRU-1087 encryption) frerHP...29N8CGMPLVHoCpmc given below (and PGP encrypted).
  • PGP encrypted message to FMS (Freenet) board public or board named zzz.userboard.rfree.
  • PGP encrypted message to i2p mail rfree@mail.i2p or from regular email to rfree@i2pmail.org.
  • the default IRC on i2p, nickname rfree (check if nick is authenticated).

Security of this methods:

  • i2p-bote + PGP is: Privacy-Best+, Distribute-Medium, Auth-Best+. (QC resistant if using the NTRU address).
  • i2p-bote: Privacy-Best, Distribute-Medium, Auth-Best. (QC resistant if using the NTRU address - BUT this is not so verified encryption and if you do not use PGP as another well-trusted layer of security it could be one day a problem is mathematical weakness is discovered).
  • FMS + PGP is: Privacy-Medium, Distribute-Best, Auth-Best.
  • mail.i2p + PGP is: Privacy-MediumLeak, Distribute-Bad, Auth-Best.
  • irc in i2p is: Privacy-Weak, Distribute-Bad, Auth-Weak.

Privacy-Excellent: No one should be able to tell if you send any messages to anyone, and did I got any messages from anyone at all. Privacy-Best: No one should know that we (you and me) communicated. Privacy-Medium: People see that we communicate but can not tell what was content of the communication. Privacy-MediumLeak: Same, but in case of email data is leaked: the Subject header of email, the data (and timezone), metadata like your OS. Privacy-MediumLeak2: Same, but also you leak your IP and more. Privacy-Weak: People can see that we communicated and what we talked about. Privacy-None: Everyone sees all that we see.

Distribute-Best: No one can censors our messages, there is no server - and resistant to DDoS/spam (WoT). Distribute-Good: No one can censors our messages, there is no server. Distribute-Ok: It is hard to censor our messages, there are many servers and hard to find our messages. Distribute-Bad: There are not many server and their admins is forced or malicious could censor.

Auth-Best: Strongly cryptographically signed, and it is easy to use evidence for future. Auth-Good: Strongly cryptographically signed. Auth-Weak: Authorized in a weak way (e.g. just a password given to centralized server).

The i2p-bote addresses are quite long, here we go:

NTRU-1087 Encryption (Quantum-Computers resistant... but still use PGP/GPG too)

Email Destination: frerHPrgehGLbjjZdcwtxXGglspJG1cobb8VeM2Uhf3x8gwUYvHllsSrjBm9LJh6148~QDHgiqAS71dZVt54g99GHPIE9F9KSlIfQon7KPfzEaHaoOUirrMGjuejJYgjteE-5a-biTWZAs9-~rdS8sCyxoNbjfZ10Vh3BPae1VFfnDIndOeSxJU8zaZenYNqFdIi-9r9BW-yvsm9eSNoqWTN5JDIvMXp8Mgqqib1gEurByEwmxA6GgUZXC08mROXoFqcwPutmpsAraFsZkv6jsB9zKKNBQeCHwITqkYf9gbdDWoDLJB4GMvRYI8gXNAksEB7--Kf7yfAY76Uj0hmdU1l63j8A-lj5Kp0N35EVg3iC89~bSxH2lxShI6AethZ5oWLk25fpqkarx4iT5V2b0e2Igdyg5CZMCSEljEnPRkiLlSozJZTVd3O3BkwB455GiH7gB~bPDLns0xXu8L42xjxHOERg9MVUMVtvXFfGQHTan-Hv~VlIoBtLsqZQ~XbecTNdQJCWAHMzRROdobXxquDUThiMU91Nzi87VyJ8JHYT5BUZgE6xfXFyeoEo~AcvsCXz5Ci8YR0-byUq5rmKXJmUiY7vcZjB~nbU-4J-QtI-4~Zqgjk-pf9QNCkFYAIUIWnkriN79uZ2NPASPa0W0x2CqSRmQOC~yUPd35LXSaGgOeGjYpaYTElrsszpkKUQ4230EtHKqZZQVPbuw6~DNp-ArtIIRfkW3hzwoeAcEAh9ugcdylsPCfnc~QFAtSwrzIJadqNESklgadiW5lwLNN0AztyZv~4kg7EPU7Fur8wOuA~UEQVUmwVqOfxyO9rBozpSZtSUHP9qCXUIxzj8KPBpZIOJi5d74jOHamSaPnpgkkgBBPPyoK5Ik-8zxWIV6~VMvAP6g8DS1TTA0a0~ZzTfGOKTl~YjATy4t9bM8wbYzHk~~FqbeDSAhQ0jDqWp1VNeuBRH5B670ppD9zotT1fkFWNQ8miRZwWJD4XOTVFw~4n7U9tV1O0IzIjlBJd74~rcZVODRsB9dGirdNCQ6cK0r-itG7NiqDh~zo1tv56i6dguAIk9E8E0KbGm9FF-Ef0b1za~X~iTmJDr5I2mo--Cdv1E8A2zCiXMGX4h5MeOhC4vuKyp4XTww2No1ARF9uxq54Cr6RZxpHG8qzuq~YgoPgRPrFMhqbdKWTQk4jcN~wYnypTp95PDqpuw1qLg6e-8LSQ6LNwbBcHJSZlvyZw-5lveaxa~8ayTFxnRy9IS6zViFL6k49YFCCe7WQbUWn0Z57EX9ZTHVeBtgRr7J1EpABlFWa7018JgSNTPkvRbM4HszQRAMnG-nBxECeXFJdJNgrRqqjCQzmMt4JmVTeugGmxbafE~BFDVId8ZOholAjjOlMC6Gciech-uJ4NyF9zrJrC-W1ByyG1txgMNeP57vnhXjY43ivnhZtCtqZ8KutCZlp~T31BWvLUSpaYSfLJcryaroElQeJ1A5TN90YyDaZIGD45ppTnn-wUnL75goZlYX-iT11ViK6pp7CVJ6zwYxtPU0A99KnCQNiEhxD-J0H7V6Nbe5Xwl-9P4AiwyO2Fkkbyud5jW3RraCYu32LJSGk3ZK81l1W0ChL3Jlvs4XvIZZ-DBgcff5wTA4M7g~cLPvcmNSQjKeUYpJie-VkbUbwmQI1V5zX8uC6-oLE3KBKm7SZfpwugttEhKn49kRuyBaNcleQG5tB8-uLupu4L7GD83XduXQRbFaBKAW5LGaMPb1Nr7mcLRgKC4Fh~Rz1XSGJsgCidTNw9fow2W-mweteUimDWv3zwKPB~ewTGKJNRfYMjGQYPMldy6PofpCOtGoDEaqpd8pp~x5vyZ1QQYbrRe9EGSlIhxTCZ3l9HasqooLbrqApi81Y40iVn2jtCtqxGSPgWGp-J6Nbejgph8j6F~y62wfqyqJ75lweMLMhw15sX9i4MITpNOZG50Ue3TcevnhMFZy8rT-GqVVZWEH8tA1O5JQhK9Gvbxe5i1hAwN0bOBwfwjDej-SuAID6FeClbzCzcrLC~SVzzttZqzqPN5FdYBfO29N8CGMPLVHoCpmc

Fingerprint: Bishkek - arias - fame - beet - magpie - Lagos - Yuri - locking

521-bit Elliptic Curve Encryption

Email Destination: FREfg~bOqVcHASC9ROZxhJ2OB3WNkbdo7HuAQMSPnXQPiIuslfQKYBSU5H6KxEO-n62jLGSFaBnMb~lHVt-MJhEId0m5ABkIgle9bEvBBXG3rkL4GF-rRMaAk7R8dDs057RnOaous25NPn2eHC~q1G96VE4jUVEIz5R8uw9X2BO4Ks

Tags: contact, i2p, freenet, git, otr, pidgin, rfree, gpg, pgp, irc, qc