Hardware Reference
In-Depth Information
You should now see that the encryption indicator in the blue top bar next to
your friend's name has changed from [unencrypted] to [OTR] [untrusted] .
Your conversation is now encrypted until either you or your friend ends the
OTR session with the /otr end command.
3.
However, how do you know that your friend is indeed your friend and not
a sneaky agent simply logged in to your friend's account? That's where the
authentication feature of OTR comes in handy.
There are three methods available in Profanity to help you verify that your
friend is really who you think it is:
° Fingerprint verification: This is the classic method that all OTR
capable clients should support. An OTR fingerprint is like an
identification string that is unique to your private key.
Type the following command to view your OTR fingerprint:
> /otr myfp
Now your friend does the same on their end. Then you two need to
find a way to communicate each other's fingerprints outside of the
chat. You could scribble them down and meet up for coffee, or if
you're not quite as paranoid, call up your friend and exchange the
last four characters of your fingerprints.
To see if your friend's fingerprint checks out, type the following
command while in the OTR chat window:
> /otr theirfp
If it matches what your friend told you, you would use the following
command to flag your friend as trusted:
> /otr trust
You should now see that the encryption indicator on the blue top bar
next to your friend's name has changed from [untrusted] to [trusted] .
° Question and answer: this method allows you to verify the identity
of your friend by asking a question and receiving the expected
answer. For example:
> /otr question "Which berry is essential to me?"
raspberry
° Your friend will be presented with the question in quotes. If your
friend issues the following command:
> /otr answer raspberry
 
Search WWH ::




Custom Search