New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changing the current ip "hash" system #556
Comments
I believe its intended purpose was to make it so that moderators could not see IP addresses in the clear. I think a system like this would be the best for the privacy minded:
Doing this would make sites a lot more secure in the event of compromise or a rogue moderator/admin. |
But then not even admin can see the raw IP when its enabled.
Running a npfchan fork for almost 2 years I can't say that I like the way they implemented. It has some major flaws, like the one you said: no way to reverse the hashed ip to plaintext. In my opinion, the system you describe is perfect. |
If you have the Note: There's theoretically a possibility for different IPs to have the same hash, but the chance of that is minuscule (especially with v4 addresses and the standard poster_id_length of 10 (which is 40 bits)). |
you want something like sunshine. you make a key offserver. u give the server just the public key. the server encrypts IP in a table called (well called by me) with rows board, thread, post, and first 256 chars of body. then to reveal to LEO, u find the row manually, u copy the ciphertext to ur local machine, and do the decryption. |
u should use elgamal or ECDSA for the encryption so as not to waste a lot of space w/a CBC scheme for likely short data. |
The current hash mechanism is useless, Serves almost non purpose and couldn't figured out why someone would use that.
Replacing the current implementation with the same mechanism infinity had, mods with no permission to see raw ip, see the hashed one in every step,
The text was updated successfully, but these errors were encountered: