Seems a bit hard to verbally exchange keys and sign your speech though.
rainerloeten@lemmy.world 1 week ago
We don’t need code words, we need a proper PKI (public key infrastructure) for authenticated communication.
lud@lemm.ee 1 week ago
rainerloeten@lemmy.world 1 week ago
Yeah, I wouldn’t recommend doing that.
And that’s not how you establish a PKI or implement AE (authenticated encryption). When I send a voice message e.g. I don’t verbally sign it, that’s actually part of KE (key exchange) protocol.
Same applies to non encrypted, authenticated communication of course.
And in case you are talking about physical face to face communication: I think you’d recognize your family and friends without the help of cryptography.
lud@lemm.ee 1 week ago
Of course you don’t verbally sign voice messages. That wouldn’t make any sense at all unless you are a robot or something.
It was just a joke. But if you wanted to authenticate something (like an email, or voice I guess) in a PKI you would sign it using your certificate private key and the CA would tell the recipient if it’s valid or not.
Feathercrown@lemmy.world 1 week ago
That’s what the article is about though, voice messages can now be spoofed. It happened to one of my friend’s parents
stevedice@sh.itjust.works 1 week ago
You receive a call from an unknown number and they tell you they’ve kidnapped your wife. They then give her the phone so you can hear her but she didn’t do it through Signal so she’s obviously not your wife so you just hang up.
Feathercrown@lemmy.world 1 week ago
You can use this to your benefit though
Instant win