TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Intro to securing communication protocols with Noise

39 pointsby grundprinzipover 4 years ago

3 comments

lucb1eover 4 years ago
Note that this Noise Protocol is just an alternative to TLS; it is not actually about adding noise to your data to prevent metadata leaking (sending noise to random people to hide contacts, sending noise to hide how much you're talking to different contacts, or just sending noise alongside messages to hide how much you're talking to one contact or how large your messages are). I'm confused every time this noise protocol comes up (apparently not often enough for me to remember right away). The "communication" in the title should also not be interpreted too specifically. It's just about two computers talking to each other, not about securing your communications by adding noise, perhaps that added to the confusion in this case.
bpolveriniover 4 years ago
If you&#x27;re interested in seeing an interesting off broadway twist on the Noise Protocol Spec, libdisco and strobe are really interesting:<p><a href="https:&#x2F;&#x2F;www.discocrypto.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.discocrypto.com&#x2F;</a><p><a href="https:&#x2F;&#x2F;strobe.sourceforge.io&#x2F;" rel="nofollow">https:&#x2F;&#x2F;strobe.sourceforge.io&#x2F;</a><p>The Noise Protocol spec is fantastic. It asks a reasonable set of questions to a protocol designer and in exchange gives a set of safe choices for key exchange. It&#x27;s a great example of building powerful systems from a handful of simple abstractions. Trevor Perrin (and I&#x27;m sure, not just he) did a phenomenal job.
motohagiographyover 4 years ago
In terms of how people who work with security protocols can reason about it, was not-including a spec either in the Standard Notation for security protocols or a sequence diagram on purpose? I thought these were pretty standard conventions.