You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
There are (at least) two sources of sensitive timing metadata in GPG keys that we would like to obfuscate: the creation date and the expiration date. Initially, I was hoping we could just update the metadata of the existing keys, because I knew the expiration date may easily be changed with gpg --edit-key if one can access the private key. Unfortunately, some Internet research suggests the creation date cannot be changed.
I think that leaves us with the following possible, though slightly more complex, approach:
When a source logs in, check to see if their reply key ought to be replaced (e.g. has an expiration date, does not use the fixed creation date).
Generate a new reply key that does not leak timing metadata.
Use the old reply key to decrypt all of their currently stored replies.
Description
Follow-up to #3912, specifically #3912 (comment) and subsequent comments.
The text was updated successfully, but these errors were encountered: