Security Cryptography Whatever cover image

Matrix with Martin Albrecht and Dan Jones

Security Cryptography Whatever

00:00

A Semi Trusted Impersonation Attack in the Matrix Protocol

The key sharing feature is that you've got each user has a bunch of devices. And a design goal is that when a user enters a chat, you'd like all of their devices to be able to read messages from that point onwards. The attack achieves the same level of impersonation as a legitimate feature called key forwarding or key sharing in the matrix protocol. It's kind of just a simple request response protocol. You can forcibly send one of those messages over home to a client and then accept it.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app