Security Cryptography Whatever cover image

Matrix with Martin Albrecht and Dan Jones

Security Cryptography Whatever

00:00

A Semi Trusted Impersonation Attack in the Matrix Protocol

The key sharing feature is that you've got each user has a bunch of devices. And a design goal is that when a user enters a chat, you'd like all of their devices to be able to read messages from that point onwards. The attack achieves the same level of impersonation as a legitimate feature called key forwarding or key sharing in the matrix protocol. It's kind of just a simple request response protocol. You can forcibly send one of those messages over home to a client and then accept it.

Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner
Get the app