
Threema with Kenny Paterson, Matteo Scarlata and Kien Tuong Truong
Security Cryptography Whatever
00:00
The First Attack on a TAC1
The vulnerability is in the C to S handshake. This is the lower protocol that you use to establish connectivity with, before you do end-to-end messages over it. If you can steal an FMR key, then it is equivalent to stealing the long-term key. It does also resemble another attack that there was on OTR at some point. And it's interesting how history repeats itself,.
Transcript
Play full episode