2d6329e89a | ||
---|---|---|
README.md | ||
contributing.md |
README.md
Awesome Secure Messaging
A curated collection of links for secure messaging. Part of the "Awesome X" series.
The list is periodically updated with new links. Click "Watch" in the right top corner to follow.
Your contributions are welcomed.
Table of Contents
Fundamentals
-
SoK: Secure Messaging - evaluation of current secure messaging solutions based on security, usability and adoption
-
Viewing Privacy as a Security Property - presentation by George Danezis that tells the story of privacy as security, informational self-determination
Messaging
-
Double Ratchet - two-party protocol to exchange encrypted messages based on shared key
-
Bramble Transport Protocol - transport layer security protocol for delay-tolerant networks, provides secure channel between two endpoints
-
Bramble Synchronisation Protocol - data synchronisation protocol for delay-tolerant networks
Trust establishment
-
X3DH - two-party asynchronous key agreement protocol
-
Bramble QR Code Protocol - in-person key agreement protocol to establish a shared secret
Anonymity
-
The Differences Between Onion Routing and Mix Networks - brief comparison
-
Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency—Choose Two - on fundamental tradeoff for anonymous communication protocols
-
Selected Papers in Anonymity - meta-list of selected papers in anonymity since 1977
-
Sphinx: A Compact and Provably Secure Mix Format - paper on secure and compact message format for mix networks
-
Sphinx Mix Network Cryptographic Packet Format Specification - specification for Sphinx mix network packet format
-
Introducing Anonymous Communications slides - notes by George Danezis on properties, threat models, systems & attacks
-
Anonymous Communications slides at CCC - another overview of anonymous communication systems by George Danezis
Censorship Resistance
-
Pluggable Transport - specification initiative to allow applications being used as transports to make network traffic harder to distinguish and block, origins in Tor
-
Selected Research Papers in Internet Censorship - meta-list of papers on censorship and resistance thereof
Cocercion Resistance
-
Coercion-Resistance and Receipt-Freeness in Electronic Voting - academic paper that outlines ways to provide coercion-resistance for electronic voting
-
Coercion-Resistant Electronic Elections - paper on coercion resistance and trusted setup requirement
-
On-Chain Vote Buying and the Rise of Dark DAOs - on problems of user generated keys and electronic voting
Attacks
- The Sybil Attack - attack on p2p systems from cheap identity generation, requiring some form of logically centralized authority