Cointime

Download App
iOS & Android

Vault1317: Information Delivery in the Web3 Era Needs Not Only Security, but also Privacy

Cointime Official

By Cointime.com 237

In the past decade, the Internet has become the platform for the transmission of most information. At the same time, disclosures of widespread surveillance and interference in the area of security technology have increased public concern about the security and privacy of communications. Many people want to be able to maintain control of their information on the Web, but few are able to do so.

In response to these needs, new secure communication protocols, components and applications have emerged in recent years. The purpose of these end-to-end encryption protocols is to establish encrypted sessions between communicating endpoints, making messages within the session difficult to decipher easily from the outside. They also provide mechanisms to check message integrity and confirm that messages have not been tampered with outside of them.

However, integrity mechanisms often provide irrefutable evidence that someone did send a particular message. As a result, some teams following the example of OTR developers have started to work towards the unification of integrity and deniability during normal communication, i.e., leaving no cryptographic evidence that the sender sent a particular message, at least if the communicating participants can confirm that the message has not been tampered with.

And Vault1317, which we will introduce today, is one of the newcomers.

Vault1317: Secure Messaging for Secure Messaging

Vault1317 is an authenticated key exchange protocol with public key concealment and participant deniability designed for secure messaging.

As a secure communications protocol, Vault1317 is designed to provide end-to-end cryptographic protection and metadata protection, while maintaining deniability. The protocol is based on the Signal protocol, which is widely regarded as one of the most secure and privacy-conscious communication protocols. vault1317 extends the Signal protocol by adding additional features such as metadata protection and deniability. Metadata protection is implemented through the use of an additional handshake protocol that helps hide the cryptographic identity of the sender and receiver, as well as other metadata associated with the communication.

By using a symmetric encryption scheme and considering deniability, along with the additional handshake protocol mentioned earlier, Vault1317 ensures that the sender can deny the message sent if necessary, even if the message is intercepted or leaked. vault1317 is a promising solution for those who want to protect metadata and provide message deniability while communicating securely and privately. .

Principle Introduction

1. What is deniability?

In the field of communication, "deniability" refers to the ability of a party to deny a message sent or received by it during the communication process. Deniability is divided into deniability of the sender and deniability of the receiver.

Sender's deniability means that they can deny the fact that they sent a particular message, thus affecting the trust and cooperation of other participants.

The deniability of the receiver, on the other hand, means that they can deny the fact of receiving a specific message, which may lead to disputes and controversies.

To address the issue of deniability, technologies and protocols such as digital signatures, encryption, and timestamps are used in communications to ensure trustworthiness and traceability of communications.

In addition, at the legal level, deniability also involves legal regulations and requirements for contracts, electronic commerce and digital evidence.

2. Solution Principle

In fact, although instant messengers such as Signal and WhatsApp employ good encryption, they still lack the ability to provide deniability, which is essential for secure communication. If an attacker takes control of one of the parties or the server and leaks the chat during their communication, both parties can deny their chat, making it difficult to hold either party accountable.

Vault1317 solves this problem by implementing a provably secure deniability mechanism that ensures the authenticity of the chat content while providing both communicating parties with a reasonable possibility of denial.

3. Metadata Protection and Centralization Issues

Another key issue in modern communications is metadata protection. During communication between two parties, their long-term identity public keys are often exposed, which makes it easier for attackers to identify and track them.

Vault1317 solves this problem by hiding the long-term identity public key, ensuring that metadata remains private and secure.

Finally, Vault1317 is designed to address the centralization of modern social media and instant messengers, which can make them vulnerable to censorship and surveillance. By adapting Vault1317 to decentralized platforms such as Nostr or XMPP, the project ensures that communications are not controlled by a single entity and that users can communicate freely and securely.

Team Introduction

Vault1317 is being developed by HardenedVault, a full-stack infrastructure-focused security company that specializes in Linux system security baselining and auditing, OS runtime threat protection, hardware/firmware root-of-trust technology, sub OS layer security (hardware/firmware root-of-trust), trusted computing (proof of services), confidential computing (trusted execution environment), multi-party computing, zero-knowledge proof (ring signatures/SNARKs/homomomorphic encryption/etc), self-custody upon entropy as a service, and other technology modules. Their achievements in security work have been recognized by the open source community and the security industry.

HardenedVault has spent 9 years in continuous development of advanced security protection technologies that effectively allow home computers to enjoy Tier-4 level security.

Technically, HardenedVault's technology solution covers the complete FIRST HALF system security, where the root of trust is anchored in multiple hardware components during the boot process of each node (machine), based on which the chain of trust extends from firmware and operating system to applications, with each critical component meeting industry compliance while effectively blocking known and unknown vulnerabilities through the integration of modern defensive mitigation technologies and access control The chain of trust extends from firmware and operating systems to applications, each critical component meeting industry compliance while effectively blocking known and unknown vulnerabilities and exploits through the integration of modern defensive mitigation technologies and access controls. In addition, to meet advanced threat protection scenarios, Cyber Fortress' secure communication solution not only enables communication between each node (including for applications such as Trusted Computing Remote Proof) to ensure confidentiality and integrity, but also provides additional secure communication protocols with zero-knowledge proof-based metadata protection (to protect machine privacy) and deniability to help customers build a decentralized, confederation-based Data Center.

Conclusion

As concerns about communication security and privacy continue to grow, new secure communication protocols and applications are emerging that offer promising solutions for protecting personal information and enabling deniability.

Vault1317, an authenticated key exchange protocol, is dedicated to providing secure messaging and maintaining deniability. By extending known secure communication protocols such as Signal, Vault1317 introduces metadata protection and deniability features that enhance the privacy and security of the communication process. The development of this protocol makes it possible to communicate securely and privately while protecting communication metadata and providing deniability.

In the future, as more people become aware of the importance of communication security, we can expect similar innovative solutions to emerge to further enhance the level of security and privacy protection of communications and ensure that personal information is better protected on the network.

Comments

All Comments

Recommended for you

  • BTC Drops Below $71,000

    Market data shows that BTC has fallen below $71,000, currently trading at $70,969.43. The 24-hour gain has narrowed to 1.4%. The market is experiencing significant volatility, so please implement risk control measures.

  • Franklin Templeton and Ondo Finance Launch 24/7 Tradable ETF for Crypto Wallets

    March 25th news: Global asset management giant Franklin Templeton, in collaboration with Ondo Finance, has officially launched an ETF product specifically designed for crypto wallets, enabling 24/7 trading.

  • NVIDIA (NVDA.O) Gains Expand to 3%

    Market data shows that NVIDIA (NVDA.O) gains have expanded to 3%.

  • Iran Sets Five Conditions for Ceasefire, States 'Accept Conditions Before Negotiation'

    On March 25, according to Press TV, a news outlet controlled by the Iranian government, an Iranian official stated that Iran has rejected the U.S. proposal and insists that the war will only end on Iran's own terms and timeline. The official, who is familiar with the details of the Iranian government, emphasized that Iran will not allow Trump to decide when the war ends. He also highlighted Tehran's determination to continue defending itself and to inflict 'heavy blows' on its enemies until its demands are met. The official outlined five specific conditions for Iran to agree to end the war: 1) A complete cessation of enemy 'aggression and assassination' actions. 2) Establishment of a specific mechanism to ensure that war is not imposed on Iran again. 3) Guarantees and clear definitions of compensation and restoration costs for war losses. 4) Ending the war across all fronts and among all resistance organizations involved in the region. 5) International recognition and safeguarding of Iran's sovereign rights to exercise jurisdiction over the Strait of Hormuz. Iran has communicated to all well-meaning intermediaries that the prerequisite for a ceasefire is the acceptance of all its conditions. The official emphasized, 'No negotiations will take place before this,' and reiterated that Iran's defensive actions will continue until the aforementioned conditions are met.

  • Iran Announces It Will End War at Its Own Chosen Time

    According to Iran's Press TV: Iran has stated that it will end the war at a time of its own choosing.

  • Trump Plans to Appoint Zuckerberg, Huang Renxun, and Ellison to Technology Advisory Council

    On March 25, according to The Wall Street Journal: Trump plans to appoint Zuckerberg, Huang Renxun, and Ellison to the Technology Advisory Council. (Jin Shi)

  • BTC Surpasses $72,000

    Market data shows that BTC has broken through $72,000, currently trading at $72,007.52. It has seen a 24-hour increase of 1.24%. The market is experiencing significant volatility, so please implement risk control measures.

  • BlackRock Transfers 11,780 ETH and 634 BTC to Coinbase Prime Address

    According to data monitored by Arkham, approximately half an hour ago, BlackRock transferred a total of 11,780 ETH, valued at approximately $25.75 million, to a Coinbase Prime address through its Ethereum exchange-traded fund (ETF) ETHA. Additionally, approximately 634 BTC, valued at approximately $45.35 million, were transferred to a Coinbase Prime address through its Bitcoin ETF, IBIT.

  • US Republican Representative Calls for Trump's Removal Under 25th Amendment

    March 25th News, Market News: US Republican Representative Alexandria Ocasio-Cortez has formally called for the removal of President Trump under the 25th Amendment of the Constitution. (JIN10)

  • Iranian Navy: US Aircraft Carrier Will Become Target Once Within Missile Range

    On March 25, according to the Iranian SNN news agency, Iranian Navy Commander Irani stated that the US 'Lincoln' carrier strike group is under continuous surveillance by Iran, and once it enters the range of missile systems, it will become a target for strikes. (Jinshi)