Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18
Introduction
00:00 • 3min
The Signal Stock in the Twitter App for Android
02:35 • 5min
The Fragility of GCM
07:15 • 2min
The Diffie-Hellman Key Exchange Problem
09:39 • 2min
How to Use Triple Diffie-Hellman to Authenticate Key Exchange
11:12 • 3min
TensorNoth's Encryption for Android App Backup
14:30 • 3min
Encrypted Conversation Keys
17:16 • 5min
The Twizzer Protocol Is Not Ideal for Encrypted Conversations
22:42 • 2min
Twitter's Constraints on Encrypting Conversation Keys
24:23 • 2min
The Importance of Trusting the Server
26:37 • 5min
The Importance of Forward Secrecy in Signal
31:26 • 4min
The Importance of Metadata Security on Twitter
35:18 • 2min
Encrypted Messages: The Future of Encryption
37:31 • 2min
Twitter 2.0's Unauthenticated E-Curve
39:24 • 2min
The Importance of Double Ratchet Cryptography
41:17 • 2min
How to Build an End Encrypted Messaging System
42:48 • 4min
Twitter's Encrypted DM Feature Is a Threat Model for Twitter Users
46:37 • 2min
Twitter's DMs on Mastodon Are Bad
48:48 • 3min