Global Feed Post Login
Replying to Avatar Mike Dilger ☑️

So digging into the double ratchet protocol, I think the device has to have both medium-term and long-term keys available to decrypt everything in the past, and an attacker would likely steal both of those and decrypt everything in the past. The protocol then would generate future keys that the attacker wouldn't have unless they continued to control the user's device. I think it does the best thing possible, but it is still quite possible to steal all the past messages even under Signal's double ratchet protocol. It makes no sense to me that an attacker would only get one key or the other -- maybe they are presuming a cryptanalysis only attack.

Avatar
DanConwayDev 1y ago

What about creating a 'disappearing messages' UX where clients would automatically drop keys after a certain amount of time?

I'm not sure if this has already been discussed.

Reply to this note

Please Login to reply.

Discussion

No replies yet.