Security Cryptography Whatever cover image

Threema with Kenny Paterson, Matteo Scarlata and Kien Tuong Truong

Security Cryptography Whatever

00:00

The Second Best Attack on the Paper

"It's like it's remarkably similar to crime and in the way it lays out, right? Because ultimately, there's a single JSON blob," he says. "We can just vary it to trigger a compression at different places and kind of do a byte by byte attack on the previous secret" Fafecon has since put out some fixes to some of the attacks and new releases of their code.

Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner
Get the app