💾 Archived View for bbs.geminispace.org › u › mk270 › 12768 captured on 2023-12-28 at 16:36:27. Gemini links have been rewritten to link to archived content

View Raw

More Information

➡️ Next capture (2024-02-05)

-=-=-=-=-=-=-

Comment by 🚀 mk270

Re: "Dragonlady: Client Side encryption for Gemini"

In: s/Gemini

Right, so this is really a proposal for "at-rest" encryption, necessitated by using Gemini as a "store-and-forward" protocol rather than for peer-to-peer communication. Such a proposal really isn't advanced by sideswipes at HTML, Unix and Gemini, but let's leave that to one side.

The idea is that sensitive data would be stored at least for a while at intermediate hops between sender and receiver, where at least one of those hops is not trusted by the sender. Zero hops would be necessary were the sender to run his own server.

I would just abandon the idea of inlining the encrypted data, and provide a link to the cyphertext using a URL for an existing protocol (e.g., gemini:// or https://)

🚀 mk270

Dec 18 · 11 days ago

5 Later Comments ↓

🚀 Minko_Ikana · Dec 18 at 11:24:

I understand, and it is actually something I noticed is missing compared to other protocols. Gemini does encrypt the package being sent, but not the data inside that package. This would make the data encrypted at the point of creation and pre-encrypted before putting in the certifiied shipping container. So the whole data environment from local creation to being stored remotely at the destination will all be encrypted completely aside from the shipping container it's self.

🛰️ lufte · Dec 18 at 13:33:

If I understand correctly this only allows to decrypt data that I have encrypted previously myself, since I'm the one who has the encryption key and this only covers symmetrical encryption. Or do I have to manually share the key with the recipient?

🛰️ lufte · Dec 18 at 13:35:

I just noticed that Morgan mentioned my same point in a previous comment. Ignore mine.

🚀 jsreed5 · Dec 18 at 14:56:

I think this is an interesting idea. What I'm confused about is where the spec for it would live in relation to the spec for Gemini itself. I wouldn't put it in the core transfer protocol, and it doesn't fit with the gemtext spec because it's not gemtext. Are you proposing Dragonlady as a new protocol to live alongside Gemini, like Titan does?

🍵 mimas · Dec 19 at 16:25:

Interesting! Since I don't host my capsule myself, the question of the trustworthiness of a third-party server came up. I would like to see gemini offer the possibility to easily store encrypted data on a foreign server, the approach here sounds exciting.

Original Post

🌒 s/Gemini

Dragonlady: Client Side encryption for Gemini — V0.1 Following the tradition of using space themed name, we present "Dragonlady" protocol an addon to gemini to enable client side symmetrical encryption named after the infamous codename used for U2 space spy plane. TLDR This proposal would enable to have client side encryption to gemini with an addon. This is backward compatible with clients not supporting it. We are looking for feedback and we are curious to know what the gemini community...

💬 ran-ford · 11 comments · 1 like · Dec 18 · 11 days ago · #certificates #client_certificates #encryption #programming