|
11 | 11 | ## 🔒 Security Model & Features |
12 | 12 | - **Security**: Essentially unbreakable composite encryption scheme. |
13 | 13 | - **Perfect-Forward-Secrecy**: Keys are rotated after use. |
14 | | -- **Plausible Deniability**: messages are not cryptographically tied to you, providing more deniability than [Off‑The‑Record messaging](https://en.wikipedia.org/wiki/Off-the-record_messaging) ! |
15 | | -- **Mandatory SMP**: We enforce [Socialist millionaire problem](https://en.wikipedia.org/wiki/Socialist_millionaire_problem) before any chat. **MiTM attacks are impossible**. |
| 14 | +- **Plausible Deniability**: messages are not cryptographically tied to you |
| 15 | +- **Mandatory SMP**: We *enforce* [Socialist millionaire problem](https://en.wikipedia.org/wiki/Socialist_millionaire_problem) before any chat to prevent **MiTM attacks**. |
16 | 16 | - **Minimal Attack Surface**: |
17 | | - - Tkinter UI only, no embedded browsers or HTML |
| 17 | + - Tkinter UI only, no embedded browsers nor HTML |
18 | 18 | - Minimal Python dependecies |
19 | 19 | - All untrusted inputs truncated to safe lengths to prevent buffer‑overflow in liboqs or Tk |
20 | | -- **Traffic obfuscation**: Network adversaries (ISP, etc) cannot easily censorship Coldwire, because we utilize HTTP(s). |
| 20 | +- **Traffic obfuscation**: Network adversaries (ISP, etc) cannot easily censorship nor detect Coldwire usage, because we have built-in protocol obfsucation support. |
21 | 21 | - **Metadata‑Free**: Random 16‑digit session IDs, no server contacts, no logs, no server‑side metadata, enforced passwordless authentication. |
22 | 22 |
|
23 | 23 | ## ⚠️ Disclaimer |
24 | | -While Coldwire enforces paranoid‑level security features, the [protocol](https://github.com/Freedom-Club-Sec/Coldwire/blob/main/PROTOCOL.md), and codebase are under active development. |
| 24 | +While Coldwire enforces paranoid‑level security features, the [protocol](https://github.com/Freedom-Club-Sec/Coldwire/blob/main/PROTOCOL.md), and codebase are under active development. |
25 | 25 |
|
26 | 26 | **Do not** use for production‑grade secrecy until an formal audit is complete. |
27 | 27 |
|
|
0 commit comments