AI-powered
podcast player
Listen to all your favourite podcasts with AI-powered features
The First Attack on a TAC1
The vulnerability is in the C to S handshake. This is the lower protocol that you use to establish connectivity with, before you do end-to-end messages over it. If you can steal an FMR key, then it is equivalent to stealing the long-term key. It does also resemble another attack that there was on OTR at some point. And it's interesting how history repeats itself,.