Random but Memorable cover image

Unlock Darknet Data Doom with Jack Rhysider from Darknet Diaries

Random but Memorable

CHAPTER

The Trusted Device Model

It's end to end encryption. Decryption still happens on device. The thing that I really like is that we've done this in a very much a one password way. It's zero knowledge architecture. Even if any identity provider credentials are compromised, attackers actually still won't be able to access your your one password data which is huge.

00:00
Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner