Global Feed Post Login
Replying to Avatar Blake

“End to End Encryption” is just marketing without having significant and deliberate tampering detection mechanism.

Examples include secretly swapping out a certificate/key for an identity to middlemen, private key leakage, changes in code to specific safety checks or tampering protection mechanisms, or changes in forward secrecy pre-generated keys, etc.

It would be nice if we had a way to better detect these types of changes and make it very obvious to the identity. As they happen and as part of updates. It would be nose to have a trusted host OS that could help validate.

Avatar
Blake 2y ago

Nice*

Reply to this note

Please Login to reply.

Discussion

No replies yet.