year undergraduate @ Amrita Vishwa Vidyapeetham, Kerala 3. Crypto(graphy) enthusiast Author: Crypton - open source library to learn offensive and defensive crypto Twitter: @ashutosha_
3. Encryption in chat applications before E2EE 4. TLS’ limitations and what can go wrong 5. Snowden revelations 6. E2E encryption and its benefits 7. MTProto - version, components, types 8. Case Study - MTProto v1.0 secret chats 9. Widespread adoption of E2EE 10. E2EE myths and challenges 11. Trade-offs 12. QnA
[source] 2. Availability exploit [source] Existing: 1. End-to-end encryption not enabled by default [source] 2. Uses SHA-1 instead of SHA-256 in some parts of the protocol [source]
a difficult problem 2. Protection against state-level backdoors 3. Untraceability - metadata unencrypted? On ghost users and messaging backdoors - Dr. Matthew Green