Security Cryptography Whatever

Matrix with Martin Albrecht and Dan Jones

Nov 2, 2022
Ask episode
Chapters
Transcript
Episode notes
1
Introduction
00:00 • 2min
2
Matrix
01:43 • 2min
3
The Key Idea Is Matrix Derivatives
03:59 • 2min
4
Is Matrix More Like Slack Than Signal?
05:32 • 2min
5
What Should You Expect to Trust a Matrix Server?
07:45 • 2min
6
Authenticating Group Membership Requests in a Matrix Room
10:14 • 3min
7
Do You Consider Valid Attacks That the Designers Consider?
12:45 • 2min
8
What's the Point of Out of Band Verification?
14:24 • 2min
9
The Trusted Home Server Attack
16:25 • 2min
10
Is There a Multi Device Secure Messaging System?
18:38 • 3min
11
Is It Inherent in Their Design Choice?
21:13 • 2min
12
Getting Private Group Membership on Top of a Signal Service
23:02 • 2min
13
The Key Device Identifier Confusion
24:51 • 2min
14
Is That a Root Cryptographic Identity?
26:53 • 2min
15
The Man in the Middle Attack
28:38 • 3min
16
A Taxi Attack on Megalm
31:18 • 2min
17
A Semi Trusted Impersonation Attack in the Matrix Protocol
33:28 • 3min
18
What's the Impact of Injecting a Mega Home Session Into Another Client?
36:43 • 2min
19
You Can't Have Strong Confidentiality Without Authentication
38:29 • 2min
20
A C Attack to Inject a Megalm Session
40:05 • 3min
21
Is This a Bug in the Afflection Client?
42:49 • 2min
22
End to End Encrypted Backups
44:26 • 2min
23
The Paper Is Great, but You Can't Exploit It, Right?
46:06 • 2min
24
Is Message Backup a Thing That You Shouldn't Have?
47:40 • 3min
25
Doing Engineering of Any Kind of Level of Security Is Not Easy
50:17 • 4min
26
Is That All of Omega Old and the Secure Backup?
53:58 • 2min
27
The Impossibility of Multi Party Encrypted Group Messages
56:03 • 2min
28
MLS and Group Key Agreement - What's That?
57:57 • 2min
29
Is There a Security Definition for Group Membership?
59:48 • 2min
30
Is There Any Work on Formal Analysis of a Federated Environment?
01:01:31 • 2min
31
How Does Signal Work With a Federated Model?
01:03:34 • 3min