tasticgre.blogg.se

Threema vs signal
Threema vs signal






threema vs signal

As another, we demonstrate a compression-based side-channel attack that recovers users’ long-term private keys through observation of the size of Threema encrypted back-ups. As one example, we present a cross-protocol attack which breaks authentication in Threema and which exploits the lack of proper key separation between different sub-protocols. We present seven different attacks against the protocol in three different threat models. We provide an extensive cryptographic analysis of Threema, a Swiss-based encrypted messaging application with more than 10 million users and 7000 corporate customers. A group of Swiss researchers have published an impressive security analysis of Threema.








Threema vs signal