Главная
Study mode:
on
1
Intro
2
Systems
3
Encryption
4
E2E
5
Signal
6
Connection establishment
7
Ways to reduce trust
8
Web of trust
9
Keybase
10
Tofu
11
Pond
12
Deniability
13
Forward secrecy
14
Expiration
15
Compromise
16
Isolation
17
Recovery backups
18
Traffic obfuscation
19
Server hardening
20
Linkability
21
Questions
Description:
Explore the landscape of private messaging in this comprehensive conference talk from the 36th Chaos Communication Congress (36C3). Delve into the current state of secure online communication, examining the widespread adoption of end-to-end encryption and the challenges that remain in balancing privacy and usability. Begin with a threat modeling exercise to understand the various risks and actors involved in secure messaging systems. Learn about end-to-end encryption, Off-the-Record (OTR) messaging, deniability, and the Axolotl construction used by Signal. Investigate metadata risks, including contact discovery, network surveillance, and server compromise. Discover innovative approaches to addressing these issues, such as Pond's design for discovery and global network adversary protection, Katzenpost's adaptation of mixnets, Private Information Retrieval (PIR), and Secure Scuttlebutt's serverless approach. Gain insights into encryption, connection establishment, trust reduction methods, deniability, forward secrecy, expiration, compromise mitigation, isolation, recovery backups, traffic obfuscation, server hardening, and linkability. Read more

What's Left for Private Messaging

media.ccc.de
Add to list
0:00 / 0:00