Secure Messaging
Some slides adapted from Dr. Raluca Ada Popa at UC Berkeley
Secure Messaging Some slides adapted from Dr. Raluca Ada Popa at UC - - PowerPoint PPT Presentation
Secure Messaging Some slides adapted from Dr. Raluca Ada Popa at UC Berkeley End to End Encryption Only the two parties communicating can decrypt messages Forward Secrecy Key compromise doesnt compromise past session keys
Some slides adapted from Dr. Raluca Ada Popa at UC Berkeley
messages
keys
web.
give them access to all of the customers’ messages
company's private encryption keys to access the plain-text versions of messages from customers using Lavabit’s encrypted storage feature (Paraphrasing Ladar)
and voice calls
impersonation of a user by another):
expects the user to send that token back – checks that user indeed owns that phone
wikipedia
trusted introducers. Everyone else will each choose their own trusted introducers. And everyone will gradually accumulate and distribute with their key a collection of certifying signatures from other people, with the expectation that anyone receiving it will trust at least one or two of the signatures. This will cause the emergence of a decentralized fault- tolerant web of confidence for all public keys.” — Phil Zimmerman