Comment on Lawsuit Alleges That WhatsApp Has No End-to-End Encryption
wonderingwanderer@sopuli.xyz 14 hours agoIs that vulnerable to an attack if a hacker gets their public key and intercepts the data traffic? Or can it only be used to encrypt but not decrypt?
Or are the added layers of complexity designed specifically to prevent that from happening?
This is why I like open-source, because people who know more about it than I do can check everything over and say whether it’s good.
theherk@lemmy.world 14 hours ago
Actually great questions. Yes and no. There are vulnerabilities if the private key leaks, but public keys are just that; perfectly okay public in any hands. You only encrypt data with it.
What makes the Signal protocol so awesome, and other algorithms like it, is that it reduces the threat surface area further by using onetime keys. So even if your key is leaked, it cannot be used to decrypt old or forthcoming messages as the keys have already ratcheted to the next pair.
wonderingwanderer@sopuli.xyz 14 hours ago
That’s so interesting. Data kind of blows my mind. Like, how could all that information travel over wires or through the air and not get mixed up with other information on its way to its destination?
borari@lemmy.dbzer0.com 13 hours ago
Now you’re getting into “go download the TCP/IP Guide book” type territory lol. Networking is a fascinating subject.