
Threema with Kenny Paterson, Matteo Scarlata and Kien Tuong Truong
Security Cryptography Whatever
00:00
Are They Just Trying to Recreate an Authenticated Key Exchange?
The vulnerability factors the ephemeral key out of the handshake that you use to log into 3MAR. It might as well not have had the whole C-dest protocol at this point, he says. "I will say, in 3MAR's defense, that when they started doing this and developing 3MAR, it was way back"
Transcript
Play full episode