That doesn't prevent the spy from reading the mail in plain text.The Traveler said:That why you should have a sincere and valid Security Question/Answer with your account.
That doesn't prevent the spy from reading the mail in plain text.The Traveler said:That why you should have a sincere and valid Security Question/Answer with your account.
It prevents the mail from ever been send.Ufostrahlen said:That doesn't prevent the spy from reading the mail in plain text.The Traveler said:That why you should have a sincere and valid Security Question/Answer with your account.
Look at your server statistics... how many password retrievals does the Nexus get? They are all sent out in plain text.The Traveler said:It prevents the mail from ever been send.
Yes, they are send out in plain text, but only after you successfully answered the security question. So if that question is not answered correcly, there is no mail send.Ufostrahlen said:Look at your server statistics... how many password retrievals does the Nexus get? They are all sent out in plain text.The Traveler said:It prevents the mail from ever been send.
No doubt about that.The Traveler said:Yes, they are send out in plain text, but only after you successfully answered the security question. So if that question is not answered correcly, there is no mail send.
Ah, but there you assume that the nexus mail server is compromised.Ufostrahlen said:No doubt about that.The Traveler said:Yes, they are send out in plain text, but only after you successfully answered the security question. So if that question is not answered correcly, there is no mail send.
So let's say you have 200-300 valid password retrievals by real Nexus members in a year. If a spy monitors the Nexus mail server 24h/365d, how many mails can he read in plain text?
No I don't. Not the Nexus mail server by itself, but the connection between the Nexus mail server and the recipient mail server.The Traveler said:Ah, but there you assume that the nexus mail server is compromised.
This discussion triggered a new thought with me for how to do authentication in such cases. I will work this out when I have a tad more time.Ufostrahlen said:No I don't. Not the Nexus mail server by itself, but the connection between the Nexus mail server and the recipient mail server.The Traveler said:Ah, but there you assume that the nexus mail server is compromised.
Sweet, I guess that's what it's all about. Maybe 1ce has additional thoughts.The Traveler said:This discussion triggered a new thought with me for how to do authentication in such cases. I will work this out when I have a tad more time.
Yes, I know. But the more ppl use TOR, the more traffic is generated, which helps keeping other users anonymous. If you use TOR you still have a 20% chance to be anonymous. I guess that's better than nothing.isaaczibre said:You guys do know that using TOR automatically makes you more suspicious, right?
The Traveler said:Uhm, base64 is an encoding and not an encryption. So I'm not sure what you mean with this line.1ce said:Also, that bit about individual keys: Superb job on describing every password ever. Base 64 is still used very openly even in late 2014.
Kind regards,
The Traveler