AI-powered
podcast player
Listen to all your favourite podcasts with AI-powered features
The Practical Application of Cryptographic Deniability in Ford Secrecy
Perfect ford secrecy requires the long term key of the device to be compromised. The only place that we store the long-term key in session is on the dev itself. If a user doesn't have disappearing messages turned on, then there's a very high likelihood that you can just read the messages out from their data base - even if it's encripted. You would actually need to be a service note in the network to get access to a person's incrypted messages. And that is going to have a financial amow contribution requirement. Snot everyone who gets access to everyone's messages. So i think it's a much more kind of theoreticalprotection that hasn't really borne out