Security Cryptography Whatever

WhatsApp Key Transparency with Jasleen Malvai and Kevin Lewi

May 6, 2023
Ask episode
Chapters
Transcript
Episode notes
1
Introduction
00:00 • 3min
2
WhatsApp's Key Transparency Solution
02:32 • 2min
3
The Paradox of QR Code Scanning
04:59 • 2min
4
The Evolution of WhatsApp's Key Transparency Solution
07:23 • 2min
5
The Importance of Data Structure in Certificate Transparency
09:44 • 3min
6
The Merkle Tree Structure in Ethereum
12:19 • 2min
7
The Importance of Robust Infrastructure in Server-Side Protocols
13:55 • 4min
8
The Middle Ground Between Having to Check Every Efficient User
17:27 • 2min
9
How to Delete a User's WhatsApp Account
19:45 • 2min
10
How to Audit a WhatsApp Data Structure
21:32 • 2min
11
The Importance of Audit Proofs
23:53 • 2min
12
WhatsApp Maintain Key Directory: A Third Party Auditing System?
25:45 • 2min
13
How to Make WhatsApp Auto Proofs Work at WhatsApp Scale
28:02 • 2min
14
The Challenges of Implementing Key Transparency
29:53 • 3min
15
How to Authenticate a New Key to WhatsApp
33:18 • 2min
16
The Drawbacks of Signature Chains
35:00 • 2min
17
The Polynomial Cryptography
36:51 • 2min
18
How to Roll Out Key Transparency in Your App
38:45 • 2min
19
The Future of Certificate Transparency
40:25 • 2min
20
WhatsApp's Leaks
42:31 • 2min
21
How to Fix a Key Change in WhatsApp
44:08 • 2min
22
The Future of Secure Cryptography
45:39 • 2min
23
How to Use WhatsApp to Authenticate Users
47:56 • 2min
24
The Importance of Key Transparency in WhatsApp
49:28 • 2min
25
The Future of Key Transparency
51:41 • 2min
26
WhatsApp Security White Paper
53:46 • 2min