Dan Jones
@danwilshirejones.bsky.social
Reposted by Dan Jones
NEW EPISODE!
It seems like everyone that deploys E2EE encrypted cloud storage seems to mess it up, often in new and creative ways. Our special guests Matilda Backendal, Jonas Hofmann, & Kien Tuong Trong give us a tour & discuss how to actually build one securely:
www.youtube.com/watch?v=sizL...
It seems like everyone that deploys E2EE encrypted cloud storage seems to mess it up, often in new and creative ways. Our special guests Matilda Backendal, Jonas Hofmann, & Kien Tuong Trong give us a tour & discuss how to actually build one securely:
www.youtube.com/watch?v=sizL...
www.youtube.com
May 19, 2025 at 10:54 PM
NEW EPISODE!
It seems like everyone that deploys E2EE encrypted cloud storage seems to mess it up, often in new and creative ways. Our special guests Matilda Backendal, Jonas Hofmann, & Kien Tuong Trong give us a tour & discuss how to actually build one securely:
www.youtube.com/watch?v=sizL...
It seems like everyone that deploys E2EE encrypted cloud storage seems to mess it up, often in new and creative ways. Our special guests Matilda Backendal, Jonas Hofmann, & Kien Tuong Trong give us a tour & discuss how to actually build one securely:
www.youtube.com/watch?v=sizL...
How does WhatsApp implement encrypted group chats? And are they secure? @malb.bsky.social, @bedow.bsky.social and myself were keen to figure this out. After two years of reverse-engineering, analysis and a few too many proofs, I presented our work at Eurocrypt earlier today. So, what did we learn?
Formal Analysis of Multi-Device Group Messaging in WhatsApp
WhatsApp provides end-to-end encrypted messaging to over two billion users. However, due to a lack of public documentation and source code, the specific security guarantees it provides are unclear. Se...
ia.cr
May 8, 2025 at 9:59 PM
How does WhatsApp implement encrypted group chats? And are they secure? @malb.bsky.social, @bedow.bsky.social and myself were keen to figure this out. After two years of reverse-engineering, analysis and a few too many proofs, I presented our work at Eurocrypt earlier today. So, what did we learn?