↑Top
Blog
Various
About me

Tinfoilchat inspired ideas

Just repeating one of the diagram

Tinfoil-chat(pdf) is cool. Here is one of the diagrams.

Did not put much work into thinking about these below, doing this largely “for fun” and they’re not necessarily totally original;

Computers that just receive or just send.

But i thought, well now you need three computers.. What if you wanted a single device that did something like this?

So the idea is that each computer still just receives or sends. The receiving one is connected to a display and keyboard(input) where it draws the message to be created.

The second computer just looks at all the keyboard inputs, and in parallel figures out what the messages are.

In receiving, you might know H(Pubkey), and the message repeats Pubkey, so knowing someone indeed has H(Pubkey) is enough. However, in sending, the sender computer knows nothing, never receives anything other than what is typed in. You have to re-type the entire receiving Pubkey in order for it to be able to.

Attacks

Point of these schemes is that they mitigate the effect of being hacked. So lets consider being the screen(receiving) computer being hacked, for instance because one of the contacts was malicious, or on some side-channel of the crypto.

Even if the screen computer does the attackers bidding, you cannot send anything any other way than the arrows; you can only send to the display. So you can only programmatically depend that on data in the screen computer.(unless you know about it separately)

You could simply disable the device, or try feign subtil frustrating malfunctions. More active is to try get the user to think they should type something, that the send-computer will then send. For instance the private key of the screen computer. With that, you can eavesdrop on all traffic towards the device.

Note

In some ways it is really quite similar to TFC. I mean, you could easily imagine this device being hooked up, ‘network’ being pidgin, like TFC suggest. Main difference is the idea of parallel construction of the message in the sender and screen computer, and that here, the screen computer does know about what messages are being sent.

Reading the state of an installation by hardware

Instead of the OS making checksums, a separate piece of hardware does. This can also put messages to the network.

Then, when other devices exist with a similar setup, they can see if the software checksums are what they should be. So if the one computer is compromised and the others ‘watching’ it are not, those others are warned, and can warn the owner.

Blog Posts

2021-07-17 Type Stack Calculation project intro
2020-08-26 Camcorder planet viewing
2020-05-15 I Made a Sha256 based port knocking program
2017-12-26 Probably kindah like a Snowflake simulation
2017-10-29 More Pixel fun turtles
2016-09-22 Pixel fun - messing with turtles
2016-05-17 Finally put together page_html
2015-11-12 libre decentralized software
2015-02-03 Tinfoilchat inspired ideas
2015-01-07 Public goods and business models
2014-12-22 Captcha Quicky
2014-12-12 Assurance contract mention
2014-11-21 Publishing DAO, and its holy grail
2014-11-02 Grudge escrow contract
2014-09-11 The core Blockchain idea
2014-06-03 Hanging blocks
2014-05-29 Voting power needed for DAO/DO decisions
2014-05-17 What is Ethereum to people?
2014-05-08 Just show up anytime jobs
2014-05-08 Proof of Reserve and voting
2014-05-08 DHTs: more than just storage