In-reply-to » Holy moly, this is a fantastic 37C3 talk about security researchers getting attacked and they reverse-engineer and fully disclose the entire โ€“ very advanced โ€“ attack. Operation Triangulation: What You Get When Attack iPhones of Researchers Very impressive!

@lyse@lyse.isobeef.org I have read the white papers for MLS before. I have put a lot of thought on how to do it with salty/ratchet. Its a very good tech for ensuring multiple devices can be joined to an encrypted chat. But it is bloody complicated to implement.

โค‹ Read More