Security Cryptography Whatever cover image

Threema with Kenny Paterson, Matteo Scarlata and Kien Tuong Truong

Security Cryptography Whatever

00:00

Are They Just Trying to Recreate an Authenticated Key Exchange?

The vulnerability factors the ephemeral key out of the handshake that you use to log into 3MAR. It might as well not have had the whole C-dest protocol at this point, he says. "I will say, in 3MAR's defense, that when they started doing this and developing 3MAR, it was way back"

Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner
Get the app