

Threema with Kenny Paterson, Matteo Scarlata and Kien Tuong Truong
Jan 27, 2023
Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35
Introduction
00:00 • 2min
A Bird's-Side View of Our Finding
02:27 • 2min
The Nebuchadas R Matrix Paper
03:57 • 2min
How Three Mo Works?
05:33 • 2min
The First Attack on a TAC1
07:36 • 2min
Authentication of a Diffie-Hellman Ephemeral Key
09:13 • 2min
What's the Impact of the 3MAR Vulnerabilities?
10:47 • 2min
Are They Just Trying to Recreate an Authenticated Key Exchange?
12:29 • 3min
The Second Threat Model Is the Client-Server Protocol, Right?
15:31 • 2min
ATT&CK2 Attack
17:20 • 2min
C2S Cryptography
19:17 • 2min
Encrypting a Message in the Client-to-Server Protocol
20:51 • 2min
3mma
23:01 • 2min
Is PECS7 in Block Cryptography?
24:34 • 2min
Using the API of NACL to Implement a Crypto Protocol?
26:19 • 2min
The Most Complicated Attack on a Paper
28:12 • 2min
Getting to the Truth of 50 Private Keys
30:04 • 2min
Co-Fighter Attacks in NACO
31:40 • 2min
Is This Attack Necessary Given Attack Number One?
33:20 • 1min
Getting Someone to Send an Instant Message That Contain a Public Key
34:50 • 2min
Is It a Consequence of the EDE Protocols?
36:38 • 2min
Is There a Non-Storage Problem?
38:19 • 2min
The Double Ratcheting Attack
39:54 • 2min
Do We Care About Deniability in End-to-End Encrypted Messaging Protocols?
41:43 • 2min
Do We Really Care About DKIM?
43:16 • 2min
I Hate That.
45:27 • 2min
Encryption - What Does It Mean?
47:14 • 2min
How to Leak a Private Key Into a Cloud Backup
48:47 • 2min
The Second Best Attack on the Paper
50:45 • 2min
What Happened to the Front Page?
52:57 • 1min
The Court of Public Opinion Had a Lot to Say About It.
54:26 • 2min
I'm Happy That You're Using a Secure Cryptographic Protocol
55:58 • 2min
Kenny Farrison's Master's Thesis
57:52 • 2min
XYZ, TLS 1.3, and the Future of Cryptographic Protocols?
59:30 • 3min
Security, Cryptography, Whatever
01:02:02 • 2min