If big tech have a backdoor into the signal protocol (for example), then an adversary with sufficient resources will eventually too
#infosec #encryption
If big tech have a backdoor into the signal protocol (for example), then an adversary with sufficient resources will eventually too
#infosec #encryption