On Sep 24, 2019, at 1:09 PM, Justus Winter
<justuswinter(_at_)gmail(_dot_)com> wrote:
Hello :)
To reduce the amount of information leaked via the message length (see
e.g. [0]), encrypted OpenPGP messages should include decoy traffic.
0: https://mailarchive.ietf.org/arch/msg/openpgp/rG-X9rp2jlbyACoosnbxRXjCeys
What actual problem are you trying to solve.
We've discussed compressed data at length, and there's a general consensus to
my mind that implementations should move away from compression being the
default. There's less of a consensus that it should go the way of all things,
into that good night. But we agree that compression is at the very least a can
of worms.
Am I correct in understanding that you're proposing adding in decoy traffic to
pad out compressed data to its uncompressed length?
If I'm missing something, what problem are you trying to solve with this?
Jon
_______________________________________________
openpgp mailing list
openpgp(_at_)ietf(_dot_)org
https://www.ietf.org/mailman/listinfo/openpgp