-
muckle
Is this an active channel
-
franco
wish it was, but doesn't seem so 🤔
-
moparisthebest
everyone waits for you to leave to talk
😠1😂 1 -
muckle
Sad but true
-
muckle
Has anyone managed to develop a working OTRv4 coded in python
-
muckle
I have been vide coding for over a year trying to get to working managed to get aes255gcm encryption+dh double ratchet+DAKE12&3+trust fingerprint however SMP won't run
-
muckle
256 bit encryption later compared to signal + WhatsApps 128
-
muckle
Works from any terminal, basic IRC i like to run it over tor / i2p
-
moparisthebest
OTR is a non-starter for modern XMPP where we use multiple devices and might not be online all the time
-
muckle
Pretty secure with memory wiping on close. (All chat history stores in memory never written to disk
-
muckle
Yes the otrv4 docs say I should create a tor/i2p relay sever to keys to be exchanged and messages retrieved
-
muckle
Haven't got that far yet still working on SMP
-
muckle
Xmpp mainly uses OMEMO
-
muckle
?
-
franco
yes. and OMEMO is a Signal Protocol implementation
-
muckle
Yeah everyone seems to rely on this OMEMO hope there isn't a backdoor 👀
-
franco
It's been around for a while and the code is published, so I'd think someone would have noticed by now, if that was the case 🤔
-
franco
> Xmpp mainly uses OMEMO most clients implement an older version of the OMEMO XEP for now, tho: https://xmpp.org/extensions/#xep-0384-implementations ↺
-
moparisthebest
it's also been audited
-
muckle
Otrv3 is still used with known cve
-
muckle
Maybe the case with omemo
-
moparisthebest
maybe the sky is red and water is dry and this is all a simulation
-
muckle
quick note on Conversations 2.19.10 (the latest one right now in Feb 2026) – it's still running the old-school OMEMO setup (the classic one with eu.siacs.conversations.axolotl namespace, basically XEP-0384 around 0.3.0 era using AES-128-GCM). That version doesn't have stuff like key commitment, so it's theoretically vulnerable to things like Invisible Salamanders attacks in tricky multi-device setups. The newer spec (up to 0.9.0 now) switched to urn:xmpp:omemo:2 with better AES-256 + HMAC and other fixes, but Conversations hasn't made the jump yet – still sticking with the legacy impl for compat reasons I guess. Encryption's still decent for normal chatting (forward secrecy, deniability, offline msgs all work), no big public exploits out there rn, but if you're paranoid/high-threat, it carries extra risks from outdated crypto bits and old library deps (like ancient BouncyCastle in some spots). You can peek at your chat's lock icon to see the fingerprints/version hints. Maybe worth keeping an eye on updates or checking other clients that do OMEMO:2 if your contacts support it. Or just fall back to Signal.