I am just curious if it's possible to crack Pidgin OTR encryption using XMPP account connected through Tor. If so, how hard it is?
[OPSEC/Computer] How hard it is to crack Pidgin OTR encryption?
I am just curious if it's possible to crack Pidgin OTR encryption using XMPP account connected through Tor. If so, how hard it is?
[1 Points] None:
[1 Points] al_eberia:
I can't find the slide at the moment, I think it was in one of Jacob Appelbaum's presentations but the NSA was unable to recover the plaintext when given a OTR protected conversation.
Edit:
I found the image: http://cdn1.spiegel.de/images/image-793518-panoV9free-thum.jpg
It was from this story
Transcripts of intercepted chats using OTR encryption handed over to the intelligence agency by a partner in Prism -- an NSA program that accesses data from at least nine American internet companies such as Google, Facebook and Apple -- show that the NSA's efforts appear to have been thwarted in these cases: "No decrypt available for this OTR message." This shows that OTR at least sometimes makes communications impossible to read for the NSA.
[1 Points] Hank_Vendor:
somewhere between 4 and 5 Mohs
[1 Points] gaffer17754:
Longer than the statutes of limitations for most of your DNM activities.
Given an infinite amount of time and computing power, it can happen, but it would a really long time, most likely longer than the universe has existed. There's also various teams figuring out quantum computing, the alleged pattern in prime numbers, other stuff I don't know about that could put a damper in current encryption keys. Since every world government, business, major entities in general utilize encryption to keep shit private, you really have nothing to worry about.
TL,DR: Its secure as fuck