Date: Tue, 30 Jul 2019 14:45:51 +0200 From: Matlink <matlink@...link.fr> To: john-users@...ts.openwall.com Subject: Re: Question for experienced cryptographers Hello, you should first read that: https://threema.ch/press-files/2_documentation/cryptography_whitepaper.pdf then you could read security analyses of other messaging protocols like Signal, and use the same methodology to analyse that one. Note however that there are some available resources when you search "threema security analysis" in a search engine, you may first read them. Le 30/07/2019 à 11:59, Johny Krekan a écrit : > Hello, I would like to ask whether someone of you (for example > Solardesigner as a John author) could estimate what is the real security of > an applications like Threema. The webpage states that encryption mechanism > used by this software should be secure enough and there is no chance for > people to break and decrypt communication between persons which are using > this software. What do you think what method could be used by agencyes to > decrypt communication between criminals in Slovakia which are now bein > judged in most watched process in this time? The news stated that the > threema was used to encode their communication and then the news stated > that the communication was succesfully decrypted. > I am looking to see your opinions about the security of such softwares. > Nice day > Johny Krekan
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.