No video

Practically-exploitable Cryptographic Vulnerabilities in Matrix

  Рет қаралды 1,126

Black Hat

Black Hat

Жыл бұрын

We report several practically-exploitable cryptographic vulnerabilities in the Matrix standard for federated realtime communication and its flagship client and prototype implementation, Element. These, together, invalidate the confidentiality and authentication guarantees claimed by Matrix against a malicious server. This is despite Matrix’ cryptographic routines being constructed from well-known and studied cryptographic building blocks...
By: Martin Albrecht , Sofía Celi , Benjamin Dowling , Dan Jones
Full Abstract and Presentation Materials:
www.blackhat.c...

Пікірлер
Real-World Detection Evasion Techniques in the Cloud
38:38
Black Hat
Рет қаралды 3,4 М.
Kerberos Authentication Explained | A deep dive
16:52
Destination Certification
Рет қаралды 337 М.
Parenting hacks and gadgets against mosquitoes 🦟👶
00:21
Let's GLOW!
Рет қаралды 12 МЛН
Идеально повторил? Хотите вторую часть?
00:13
⚡️КАН АНДРЕЙ⚡️
Рет қаралды 17 МЛН
AES: How to Design Secure Encryption
15:37
Spanning Tree
Рет қаралды 157 М.
Tech Talk: Post Quantum Hybrid PKI Hierarchies
55:35
GlobalPlatform TV
Рет қаралды 20
Double Ratchet Messaging Encryption - Computerphile
11:39
Computerphile
Рет қаралды 160 М.
Matrix vs XMPP (vs IRC) - open source tech thoughts
24:33
Chris Were: Linux • tech • open source
Рет қаралды 8 М.
48 Dirty Little Secrets Cryptographers Don’t Want You To Know
50:58
TLS Handshake - EVERYTHING that happens when you visit an HTTPS website
27:59
Practical Networking
Рет қаралды 113 М.
The Black Hat Europe Network Operations Center (NOC) Report
38:03
Tech Talk: What is Public Key Infrastructure (PKI)?
9:22
IBM Technology
Рет қаралды 113 М.