Seems a bit hard to verbally exchange keys and sign your speech though.
rainerloeten@lemmy.world 2 months ago
We don’t need code words, we need a proper PKI (public key infrastructure) for authenticated communication.
lud@lemm.ee 2 months ago
rainerloeten@lemmy.world 2 months ago
Yeah, I wouldn’t recommend doing that.
And that’s not how you establish a PKI or implement AE (authenticated encryption). When I send a voice message e.g. I don’t verbally sign it, that’s actually part of KE (key exchange) protocol.
Same applies to non encrypted, authenticated communication of course.
And in case you are talking about physical face to face communication: I think you’d recognize your family and friends without the help of cryptography.
lud@lemm.ee 2 months ago
Of course you don’t verbally sign voice messages. That wouldn’t make any sense at all unless you are a robot or something.
It was just a joke. But if you wanted to authenticate something (like an email, or voice I guess) in a PKI you would sign it using your certificate private key and the CA would tell the recipient if it’s valid or not.
Feathercrown@lemmy.world 2 months ago
That’s what the article is about though, voice messages can now be spoofed. It happened to one of my friend’s parents
stevedice@sh.itjust.works 2 months ago
You receive a call from an unknown number and they tell you they’ve kidnapped your wife. They then give her the phone so you can hear her but she didn’t do it through Signal so she’s obviously not your wife so you just hang up.
Feathercrown@lemmy.world 2 months ago
You can use this to your benefit though
Instant win