Cyphertext Attacks, Key Rotation, and Apple iMessage

Sign in to queue

Description

Research out of John Hopkins University on Apple iMessage gives us some lessons on implementing encryption systems.

Embed

Download

Download this episode

The Discussion

Add Your 2 Cents