5min chapter

Opt Out cover image

Private messaging via Session w/ Kee Jefferys

Opt Out

CHAPTER

The Practical Application of Cryptographic Deniability in Ford Secrecy

Perfect ford secrecy requires the long term key of the device to be compromised. The only place that we store the long-term key in session is on the dev itself. If a user doesn't have disappearing messages turned on, then there's a very high likelihood that you can just read the messages out from their data base - even if it's encripted. You would actually need to be a service note in the network to get access to a person's incrypted messages. And that is going to have a financial amow contribution requirement. Snot everyone who gets access to everyone's messages. So i think it's a much more kind of theoreticalprotection that hasn't really borne out

00:00

Get the Snipd
podcast app

Unlock the knowledge in podcasts with the podcast player of the future.
App store bannerPlay store banner

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode

Save any
moment

Hear something you like? Tap your headphones to save it with AI-generated key takeaways

Share
& Export

Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode