Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31
Introduction
00:00 • 2min
Matrix
01:43 • 2min
The Key Idea Is Matrix Derivatives
03:59 • 2min
Is Matrix More Like Slack Than Signal?
05:32 • 2min
What Should You Expect to Trust a Matrix Server?
07:45 • 2min
Authenticating Group Membership Requests in a Matrix Room
10:14 • 3min
Do You Consider Valid Attacks That the Designers Consider?
12:45 • 2min
What's the Point of Out of Band Verification?
14:24 • 2min
The Trusted Home Server Attack
16:25 • 2min
Is There a Multi Device Secure Messaging System?
18:38 • 3min
Is It Inherent in Their Design Choice?
21:13 • 2min
Getting Private Group Membership on Top of a Signal Service
23:02 • 2min
The Key Device Identifier Confusion
24:51 • 2min
Is That a Root Cryptographic Identity?
26:53 • 2min
The Man in the Middle Attack
28:38 • 3min
A Taxi Attack on Megalm
31:18 • 2min
A Semi Trusted Impersonation Attack in the Matrix Protocol
33:28 • 3min
What's the Impact of Injecting a Mega Home Session Into Another Client?
36:43 • 2min
You Can't Have Strong Confidentiality Without Authentication
38:29 • 2min
A C Attack to Inject a Megalm Session
40:05 • 3min
Is This a Bug in the Afflection Client?
42:49 • 2min
End to End Encrypted Backups
44:26 • 2min
The Paper Is Great, but You Can't Exploit It, Right?
46:06 • 2min
Is Message Backup a Thing That You Shouldn't Have?
47:40 • 3min
Doing Engineering of Any Kind of Level of Security Is Not Easy
50:17 • 4min
Is That All of Omega Old and the Secure Backup?
53:58 • 2min
The Impossibility of Multi Party Encrypted Group Messages
56:03 • 2min
MLS and Group Key Agreement - What's That?
57:57 • 2min
Is There a Security Definition for Group Membership?
59:48 • 2min
Is There Any Work on Formal Analysis of a Federated Environment?
01:01:31 • 2min
How Does Signal Work With a Federated Model?
01:03:34 • 3min