i started a (very niche) private messaging protocol & little CLI app demo. i’m no security expert, so any feedback or questions would be appreciated.
the gist is an ephemeral message exchange without identities. the goal is ultimate deniability.
the interesting (and weird) part is that messages are encrypted but not authenticated. this means an imposter could show up if they know the shared secret. otoh this means you can deny anything you say.
interesting point! i chose symmetric shared key because it means you can’t prove who sent what message.
the shared secret does add some authentication, which i think is necessary. the goal is it only creates enough to be practical (a random person can’t eavesdrop), but not enough to prove things. messages themselves still aren’t authenticated by any one person.
A shared secret implies that the message was sent by someone who knows the shared secret, and that restrict the number of potential senders.
If you mail a message with gpg, everyone knows the public key, and the message is still safe.
you’re not wrong, but that’s just the trade off that has to be made, i think. it’s the only way i can think to do it, at least. need -some- authentication for practical usability.
your gpg example removes the deniability since it proves who wrote the message.
You confuse digitally signing a message with the sender’s private key, and encrypting a message with the recipient’s public key.