Security Cryptography Whatever cover image

Signal's Post-Quantum PQXDH, Same-Origin Policy, E2EE in the Browser Revisted

Security Cryptography Whatever

00:00

Challenges in Verifying Cryptographic Keys and Implications of Certificate Transparency

The chapter delves into the difficulties of verifying cryptographic keys and the use of Certificate Transparency to monitor certificates for domains. It discusses potential incidents of BGP hijacking and government involvement in intercepting communications, emphasizing the need for enhanced security measures like DNS sec and CAA configuration.

Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner
Get the app