@bascule Not really invisible. You can always observe that the key for a device has been changed: https://github.com/quarkslab/iMITMProtect …
-
-
- End of conversation
New conversation -
-
-
@bascule they would lose the ability to *invisibly* do it if they exposed the ‘fingerprints’ of the keys somewhere in the UI -
@nzkoz really needs an auditing protocol based on some grow-only data structure (Merkle trees or verifiable maps) -
@bascule some form of public directory of keys would be nice, but if you see “koz iPhone, koz iPad, koz Mac, not-nsa-honest”, it’s a start
End of conversation
New conversation -
-
-
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.