Key point: TEEs let us prove that a key was secret
18
Modifying a Signal client
19
The result: an attested transcript
20
Demo
21
Switch to online-deniable protocols
22
Defensive remote attestation
23
Put the human in the loop
24
Countermeasures
25
Not just messaging protocols
26
Black Hat Sound Bytes
Description:
Explore the intricacies of secure messaging protocols and the challenges posed by remote attestation in this 50-minute Black Hat conference talk. Delve into the design of protocols that resist attackers using remote attestation, examining both cryptographic methods like on-line deniable key establishment and Trusted Execution Environment (TEE) approaches. Understand the concept of remote attestation, its requirements, and practical applications. Investigate the desirable features of messaging protocols and the limitations of deniability. Analyze the potential dangers of undeniable communications and examine examples of deniable protocols such as Off-the-Record (OTR) and Signal Protocol. Discover a new type of attack that exploits TEEs to prove key secrecy, and witness a demonstration of an attested transcript. Learn about defensive strategies, including online-deniable protocols and human-in-the-loop approaches. Consider the broader implications beyond messaging protocols and gain valuable insights into the evolving landscape of secure communication.
Read more
The Undeniable Truth - How Remote Attestation Circumvents Deniability Guarantees in Secure Messaging Protocols