Gemini privacy

Phil Leblanc <philanc at gmail.com> wrote:
> Given your current stats, the record padding value I suggested
> previously (4,096) would be enough to almost eliminate the risk for
> more than 80% of pages and significantly reduce the risk for more than
> 90% of pages. --  and we can agree that the one 903,321 bytes document
> _will_ probably  be catched whatever the record padding :-)

Do you mean "rounding up" (by adding padding) all sent data to 4,096
bytes?  I agree, that should do quite well to hide most Gemini data.

> > > In conclusion, it's not Gemini's responsibility to handle these
> > > kinds of attacks.
> >
> > I disagree.
> 
> I agree with you disagreeing! :-)  but I think Nothien means it is not
> the responsibility of the Gemini _protocol_ to handle these attacks.
> It should rather be the responsibility of Gemini capsule owners to
> configure reasonable record padding for the typical documents they
> publish.

Yep, that's what I mean.  Thank you putting that to words neatly.

> Just writing this, I am wondering... with TLS 1.3, can the _client_
> request record padding for the server response?

Reading the TLS 1.3 spec[1], it appears not.  Oh well.

[1]: https://tools.ietf.org/html/rfc8446#section-5.4

P.S: I've been thinking about all the issues we've come across with TLS,
and I've been collecting ideas for a new transport security protocol.  I
know ~spc's stance on crypto ("get it approved by the crypto community,
make an implementation, then we'll talk"), and I'm not saying we should
switch to a magic protocol that doesn't exist; but that we should at
least consider making a wishlist of sorts of all the things that we
would want out of a "good" transport security protocol  (if you have any
such ideas, please share them with me).  I'll put up my crypto wishlist
sometime soon.

~aravk | ~nothien

---

Previous in thread (8 of 16): 🗣️ Phil Leblanc (philanc (a) gmail.com)

Next in thread (10 of 16): 🗣️ Phil Leblanc (philanc (a) gmail.com)

View entire thread.