Security Cryptography Whatever cover image

Threema with Kenny Paterson, Matteo Scarlata and Kien Tuong Truong

Security Cryptography Whatever

00:00

The First Attack on a TAC1

The vulnerability is in the C to S handshake. This is the lower protocol that you use to establish connectivity with, before you do end-to-end messages over it. If you can steal an FMR key, then it is equivalent to stealing the long-term key. It does also resemble another attack that there was on OTR at some point. And it's interesting how history repeats itself,.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app