Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

>End-to-end encrypted communications, such as OMEMO, OTR or PGP, are protected from the interception only if both parties have validated the encryption keys. The users are asked to check their accounts for new unauthorized OMEMO and PGP keys in their PEP storage, and change passwords.

The attacker would need to set up a separate MiTM for the particular E2EE scheme used. Some of the XMPP clients I have encountered will not let you use a particular cryptographic identity unless you have explicitly claimed to have verified it.

Still a good reminder. If you have not seen and dealt with a ridiculously long number (or equivalent) you have not achieved end to end.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: