<html><head><meta http-equiv="Content-Type" content="text/html charset=iso-8859-1"></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space;"><div>Hi Michael,</div><div><br></div><div>Thanks for sharing that study. It's so hard to pick good channel that can be used reliably by most users. Briar especially looks like an interesting project. If you're interested in a remote key exchange protocol, please get in touch. It would be great to collaborate. </div><div><br></div><div>It seems anonymity is an important goal of your project, and rightly so. While a SafeSlinger key exchange does not currently provide anonymity, it would be great to work with more experienced Tor developers like your team to add anonymity to remote key exchange.</div><br><div apple-content-edited="true">
<div style="color: rgb(0, 0, 0); letter-spacing: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space;"><div style="color: rgb(0, 0, 0); letter-spacing: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space;"><div style="color: rgb(0, 0, 0); letter-spacing: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space;"><div style="color: rgb(0, 0, 0); font-family: Helvetica; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;"></div><div><div>Cheers,</div><div>Mike</div><div><br></div><div>Michael W. Farb</div><div>Research Programmer, Carnegie Mellon University CyLab</div><div>M 412-965-4725 - <a href="http://www.cylab.cmu.edu/safeslinger">www.cylab.cmu.edu/safeslinger</a></div></div></div></div></div>
</div>
<br><div><div>On Jul 9, 2014, at 1:25 PM, Michael Rogers <<a href="mailto:michael@briarproject.org">michael@briarproject.org</a>> wrote:</div><br class="Apple-interchange-newline"><blockquote type="cite">-----BEGIN PGP SIGNED MESSAGE-----<br>Hash: SHA256<br><br>On 08/07/14 17:06, Michael Farb wrote:<br><blockquote type="cite">I think we can expect the availability and interoperability of<br>more local wireless channels to improve over time. I'd love to see<br>WiFi Direct supported in older devices to broaden its market share.<br>The UX design to use all available wireless channels in some sort<br>of massive discovery mode makes me shudder a little, but we need to<br>do something for those who are getting their standard Internet data<br>channels blocked.<br></blockquote><br>Hi Michael,<br><br>We've experimented with using Bluetooth and wifi (infrastructure mode,<br>not WiFi Direct) for pairwise key exchange in Briar. Although I<br>haven't rigorously tested this, it seems that on some devices, the<br>discovery success rate is lower when using both Bluetooth and wifi<br>than with Bluetooth alone. I guess this could be due to interference<br>between the two radios, or the extra processing load causing timeouts<br>at some layer of the stack.<br><br>This paper describes some problems and workarounds for using WiFi<br>Direct and Bluetooth to connect Android devices:<br><br><a href="http://www.sussex.ac.uk/Users/ianw/papers/chants13.pdf">http://www.sussex.ac.uk/Users/ianw/papers/chants13.pdf</a><br><br>Cheers,<br>Michael<br>-----BEGIN PGP SIGNATURE-----<br>Version: GnuPG v1.4.12 (GNU/Linux)<br><br>iQEcBAEBCAAGBQJTvaUxAAoJEBEET9GfxSfMpWAH/jipcJUQnbQ9FmdzfV0X9jVP<br>b8OtStihSpTIvuGXf7yrlgGViNmPqgHbZuydF2k/qrnn6MPzVzRumDYQDPDizMgg<br>1cvGFchRLmM+oXSdjJF9jZE5oUQ94EhzhHRAmAZLsLp5SiQs4bA3zB4FYVPd0WO+<br>hF38r/ssj4bEdxpl76AHmJNmiU6A+0fvteMlImtCHH6xrZqmj0BnTJEHCvH/1lGM<br>yaraWIcIsn8YwmSDtJkL46g7vuznNR1AjRQwxPKgdW/DgOs3Dtjw+U6lR8qq9sMT<br>+c/oAVe6d/2uoGGpXE2bR6j+nK8FnFWMhcTHIKccCnsKfnNMNmIWcxPEAwHmv2Y=<br>=JjvQ<br>-----END PGP SIGNATURE-----<br></blockquote></div><br></body></html>