Security Cryptography Whatever cover image

Threema with Kenny Paterson, Matteo Scarlata and Kien Tuong Truong

Security Cryptography Whatever

00:00

Are They Just Trying to Recreate an Authenticated Key Exchange?

The vulnerability factors the ephemeral key out of the handshake that you use to log into 3MAR. It might as well not have had the whole C-dest protocol at this point, he says. "I will say, in 3MAR's defense, that when they started doing this and developing 3MAR, it was way back"

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app