[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
E2E Security of Group in Signal, WhatsApp, and Threema
- Subject: E2E Security of Group in Signal, WhatsApp, and Threema
- From: jnn at synfin.org (John Newman)
- Date: Sat, 20 Jul 2019 23:03:32 +0000
- In-reply-to: <CAD2Ti2_5fCJau5J6ZXA_xzVWJNztOPes6WV=55=dmJXayANFMw@mail.gmail.com>
- References: <CAD2Ti2_5fCJau5J6ZXA_xzVWJNztOPes6WV=55=dmJXayANFMw@mail.gmail.com>
On July 20, 2019 6:59:57 PM UTC, grarpamp <grarpamp at gmail.com> wrote:
>End-to-End Security of Group Chats in Signal, WhatsApp, and Threema
>https://eprint.iacr.org/2017/713
Has anyone used keybase for group chat (like as a slack
replacement)? They seem to be touting this feature,
particularly since slack just released some info saying
their 2015 hack was more significant than originally
stated.
Keybase & slack links:
https://keybase.io/blog/slack-incident
https://slackhq.com/new-information-2015-incident
https://slackhq.com/march-2015-security-incident-and-the-launch-of-two-factor-authentication
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 496 bytes
Desc: not available
URL: <https://lists.cpunks.org/pipermail/cypherpunks/attachments/20190720/8c95e311/attachment.sig>