🏠
Author: malb.bsky.social (did:plc:eoakxdfddsy4p2m4liifdnki)

Collections

DID Doc

success:
true
identity:
alsoKnownAs:
verificationMethod:
service:

Record🤔

uri:
"at://did:plc:eoakxdfddsy4p2m4liifdnki/app.bsky.feed.post/3l3vmiqm5u62z"
cid:
"bafyreiczuekast5dgo7asx4o4zc5y36436cgakrvdq4ddiautesdhlb6vu"
value:
text:
"Our model only covers the symmetric part. We describe the key exchange as a flow diagram but we didn't model it (we only broke): mtpsym.github.io The question under what assumptions (if any) MTProto's key exchange achieves which security guarantees is still open."
$type:
"app.bsky.feed.post"
embed:
$type:
"app.bsky.embed.external"
external:
title:
"Security Analysis of Telegram (Symmetric Part)"
description:
"Overview We performed a detailed security analysis of the encryption offered by the popular Telegram messaging platform. As a result of our analysis, we found several cryptographic weaknesses in the …"
langs:
  • "en"
reply:
root:
cid:
"bafyreihz3imv47srkiptppeypmxd72uzpa5ubjlsyfv3u6grproius6nta"
parent:
cid:
"bafyreihz3imv47srkiptppeypmxd72uzpa5ubjlsyfv3u6grproius6nta"
facets:
createdAt:
"2024-09-11T19:01:17.629Z"