<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Wed, 22 Apr 2026 14:40:48 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Cryptography FM - Episodes Tagged with “Secure Messaging”</title>
    <link>https://cryptography.fireside.fm/tags/secure%20messaging</link>
    <pubDate>Mon, 16 Jan 2023 13:00:00 +0100</pubDate>
    <description>Cryptography FM is a regular podcast with news and a featured interview covering the latest developments in theoretical and applied cryptography. Whether it's a new innovative paper on lattice-based cryptography or a novel attack on a secure messaging protocol, we'll get the people behind it on Cryptography FM.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>In-depth, substantive discussions on the latest news and research in applied cryptography.</itunes:subtitle>
    <itunes:author>Symbolic Software</itunes:author>
    <itunes:summary>Cryptography FM is a regular podcast with news and a featured interview covering the latest developments in theoretical and applied cryptography. Whether it's a new innovative paper on lattice-based cryptography or a novel attack on a secure messaging protocol, we'll get the people behind it on Cryptography FM.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/a/ab43586a-0143-48c8-af78-ac9dc4316514/cover.jpg?v=2"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cryptography</itunes:keywords>
    <itunes:owner>
      <itunes:name>Symbolic Software</itunes:name>
      <itunes:email>nadim@symbolic.software</itunes:email>
    </itunes:owner>
<itunes:category text="Science">
  <itunes:category text="Mathematics"/>
</itunes:category>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<item>
  <title>Episode 22: Three Lessons from Threema: Breaking a Secure Messenger!</title>
  <link>https://cryptography.fireside.fm/22</link>
  <guid isPermaLink="false">856b33dd-f3d4-4e22-9d17-bfccafe87e75</guid>
  <pubDate>Mon, 16 Jan 2023 13:00:00 +0100</pubDate>
  <author>Symbolic Software</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/ab43586a-0143-48c8-af78-ac9dc4316514/856b33dd-f3d4-4e22-9d17-bfccafe87e75.mp3" length="76827255" type="audio/mpeg"/>
  <itunes:episode>22</itunes:episode>
  <itunes:title>Episode 22: Three Lessons from Threema: Breaking a Secure Messenger!</itunes:title>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Symbolic Software</itunes:author>
  <itunes:subtitle>Threema is a Swiss encrypted messaging application. It has more than 10 million users and more than 7000 on-premise customers. Prominent users of Threema include the Swiss Government and the Swiss Army, as well as the current Chancellor of Germany, Olaf Scholz. Threema has been widely advertised as a secure alternative to other messengers.

Kenny, Kien and Matteo from the ETH Zurich Applied Cryptography Group present seven attacks against the cryptographic protocols used by Threema, in three distinct threat models. All the attacks are accompanied by proof-of-concept implementations that demonstrate their feasibility in practice. </itunes:subtitle>
  <itunes:duration>52:12</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/a/ab43586a-0143-48c8-af78-ac9dc4316514/cover.jpg?v=2"/>
  <description>Threema is a Swiss encrypted messaging application. It has more than 10 million users and more than 7000 on-premise customers. Prominent users of Threema include the Swiss Government and the Swiss Army, as well as the current Chancellor of Germany, Olaf Scholz. Threema has been widely advertised as a secure alternative to other messengers.
Kenny, Kien and Matteo from the ETH Zurich Applied Cryptography Group present seven attacks against the cryptographic protocols used by Threema, in three distinct threat models. All the attacks are accompanied by proof-of-concept implementations that demonstrate their feasibility in practice. 
Links and papers discussed in the show:
* Three Lessons from Threema (https://breakingthe3ma.app/) Special Guests: Kenny Paterson, Kien Tuong Truong, and Matteo Scarlata.
</description>
  <itunes:keywords>secure messaging, threema, applied cryptography</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Threema is a Swiss encrypted messaging application. It has more than 10 million users and more than 7000 on-premise customers. Prominent users of Threema include the Swiss Government and the Swiss Army, as well as the current Chancellor of Germany, Olaf Scholz. Threema has been widely advertised as a secure alternative to other messengers.</p>

<p>Kenny, Kien and Matteo from the ETH Zurich Applied Cryptography Group present seven attacks against the cryptographic protocols used by Threema, in three distinct threat models. All the attacks are accompanied by proof-of-concept implementations that demonstrate their feasibility in practice. </p>

<p>Links and papers discussed in the show:</p>

<ul>
<li><a href="https://breakingthe3ma.app/" rel="nofollow">Three Lessons from Threema</a></li>
</ul><p>Special Guests: Kenny Paterson, Kien Tuong Truong, and Matteo Scarlata.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://symbolic.software">Symbolic Software</a>: <a rel="nofollow" href="https://symbolic.software">This episode is sponsored by Symbolic Software. Symbolic Software helps you bring in the experience and knowledge necessary to design, or prove secure, state-of-the-art cryptographic systems for new solutions. We've helped design and formally verify some of the world's most widely used cryptographic protocols.</a></li></ul><p>Links:</p><ul><li><a title="Three Lessons from Threema: Analysis of a Secure Messenger" rel="nofollow" href="https://breakingthe3ma.app/">Three Lessons from Threema: Analysis of a Secure Messenger</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Threema is a Swiss encrypted messaging application. It has more than 10 million users and more than 7000 on-premise customers. Prominent users of Threema include the Swiss Government and the Swiss Army, as well as the current Chancellor of Germany, Olaf Scholz. Threema has been widely advertised as a secure alternative to other messengers.</p>

<p>Kenny, Kien and Matteo from the ETH Zurich Applied Cryptography Group present seven attacks against the cryptographic protocols used by Threema, in three distinct threat models. All the attacks are accompanied by proof-of-concept implementations that demonstrate their feasibility in practice. </p>

<p>Links and papers discussed in the show:</p>

<ul>
<li><a href="https://breakingthe3ma.app/" rel="nofollow">Three Lessons from Threema</a></li>
</ul><p>Special Guests: Kenny Paterson, Kien Tuong Truong, and Matteo Scarlata.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://symbolic.software">Symbolic Software</a>: <a rel="nofollow" href="https://symbolic.software">This episode is sponsored by Symbolic Software. Symbolic Software helps you bring in the experience and knowledge necessary to design, or prove secure, state-of-the-art cryptographic systems for new solutions. We've helped design and formally verify some of the world's most widely used cryptographic protocols.</a></li></ul><p>Links:</p><ul><li><a title="Three Lessons from Threema: Analysis of a Secure Messenger" rel="nofollow" href="https://breakingthe3ma.app/">Three Lessons from Threema: Analysis of a Secure Messenger</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 16: Contact Discovery in Mobile Messengers!</title>
  <link>https://cryptography.fireside.fm/16</link>
  <guid isPermaLink="false">65362544-3293-41c7-8650-f2cf8e2058a7</guid>
  <pubDate>Mon, 24 May 2021 15:00:00 +0200</pubDate>
  <author>Symbolic Software</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/ab43586a-0143-48c8-af78-ac9dc4316514/65362544-3293-41c7-8650-f2cf8e2058a7.mp3" length="56095263" type="audio/mpeg"/>
  <itunes:episode>16</itunes:episode>
  <itunes:title>Episode 16: Contact Discovery in Mobile Messengers!</itunes:title>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Symbolic Software</itunes:author>
  <itunes:subtitle>Do we really need to rely on sharing every phone number on our phone in order for mobile messengers to be usable? What are the privacy risks, and do better cryptographic alternatives exist for managing that data? Joining us are researchers looking exactly into this problem, who will tell us more about their interesting results.</itunes:subtitle>
  <itunes:duration>46:44</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/a/ab43586a-0143-48c8-af78-ac9dc4316514/cover.jpg?v=2"/>
  <description>Contact discovery is a core feature in popular mobile messaging apps such as WhatsApp, Signal and Telegram that lets users grant access to their address book in order to discover which of their contacts are on that messaging service. While contact discovery is critical for WhatsApp, Signal and Telegram to function properly, privacy concerns arise with the current methods and implementations of this feature, potentially resulting in the exposure of a range of sensitive information about users and their social circle.
Do we really need to rely on sharing every phone number on our phone in order for mobile messengers to be usable? What are the privacy risks, and do better cryptographic alternatives exist for managing that data? Joining us are researchers looking exactly into this problem, who will tell us more about their interesting results.
Links and papers discussed in the show:
All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers (https://www.ndss-symposium.org/wp-content/uploads/ndss2021_1C-3_23159_paper.pdf)
Music composed by Toby Fox and performed by Sean Schafianski (https://seanschafianski.bandcamp.com/). Special Guests: Alexandra Dmitrienko, Christian Weinert, and Christoph Hagen.
</description>
  <itunes:keywords>secure messaging, contact discovery, security and privacy,metadata</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Contact discovery is a core feature in popular mobile messaging apps such as WhatsApp, Signal and Telegram that lets users grant access to their address book in order to discover which of their contacts are on that messaging service. While contact discovery is critical for WhatsApp, Signal and Telegram to function properly, privacy concerns arise with the current methods and implementations of this feature, potentially resulting in the exposure of a range of sensitive information about users and their social circle.</p>

<p>Do we really need to rely on sharing every phone number on our phone in order for mobile messengers to be usable? What are the privacy risks, and do better cryptographic alternatives exist for managing that data? Joining us are researchers looking exactly into this problem, who will tell us more about their interesting results.</p>

<p>Links and papers discussed in the show:<br>
<a href="https://www.ndss-symposium.org/wp-content/uploads/ndss2021_1C-3_23159_paper.pdf" rel="nofollow">All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers</a></p>

<p>Music composed by Toby Fox and performed by <a href="https://seanschafianski.bandcamp.com/" rel="nofollow">Sean Schafianski</a>.</p><p>Special Guests: Alexandra Dmitrienko, Christian Weinert, and Christoph Hagen.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://symbolic.software">Symbolic Software</a>: <a rel="nofollow" href="https://symbolic.software">This episode is sponsored by Symbolic Software. Symbolic Software helps you bring in the experience and knowledge necessary to design, or prove secure, state-of-the-art cryptographic systems for new solutions. We've helped design and formally verify some of the world's most widely used cryptographic protocols.</a></li></ul><p>Links:</p><ul><li><a title="All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers" rel="nofollow" href="https://www.ndss-symposium.org/wp-content/uploads/ndss2021_1C-3_23159_paper.pdf">All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers</a> &mdash; Contact discovery allows users of mobile messen- gers to conveniently connect with people in their address book. In this work, we demonstrate that severe privacy issues exist in currently deployed contact discovery methods.
Our study of three popular mobile messengers (WhatsApp, Signal, and Telegram) shows that, contrary to expectations, large- scale crawling attacks are (still) possible. Using an accurate database of mobile phone number prefixes and very few resources, we have queried 10 % of US mobile phone numbers for WhatsApp and 100 % for Signal. For Telegram we find that its API exposes a wide range of sensitive information, even about numbers not registered with the service. We present interesting (cross- messenger) usage statistics, which also reveal that very few users change the default privacy settings. Regarding mitigations, we propose novel techniques to significantly limit the feasibility of our crawling attacks, especially a new incremental contact discovery scheme that strictly improves over Signal’s current approach.
Furthermore, we show that currently deployed hashing-based contact discovery protocols are severely broken by comparing three methods for efficient hash reversal of mobile phone numbers. For this, we also propose a significantly improved rainbow table construction for non-uniformly distributed inputs that is of independent interest.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Contact discovery is a core feature in popular mobile messaging apps such as WhatsApp, Signal and Telegram that lets users grant access to their address book in order to discover which of their contacts are on that messaging service. While contact discovery is critical for WhatsApp, Signal and Telegram to function properly, privacy concerns arise with the current methods and implementations of this feature, potentially resulting in the exposure of a range of sensitive information about users and their social circle.</p>

<p>Do we really need to rely on sharing every phone number on our phone in order for mobile messengers to be usable? What are the privacy risks, and do better cryptographic alternatives exist for managing that data? Joining us are researchers looking exactly into this problem, who will tell us more about their interesting results.</p>

<p>Links and papers discussed in the show:<br>
<a href="https://www.ndss-symposium.org/wp-content/uploads/ndss2021_1C-3_23159_paper.pdf" rel="nofollow">All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers</a></p>

<p>Music composed by Toby Fox and performed by <a href="https://seanschafianski.bandcamp.com/" rel="nofollow">Sean Schafianski</a>.</p><p>Special Guests: Alexandra Dmitrienko, Christian Weinert, and Christoph Hagen.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://symbolic.software">Symbolic Software</a>: <a rel="nofollow" href="https://symbolic.software">This episode is sponsored by Symbolic Software. Symbolic Software helps you bring in the experience and knowledge necessary to design, or prove secure, state-of-the-art cryptographic systems for new solutions. We've helped design and formally verify some of the world's most widely used cryptographic protocols.</a></li></ul><p>Links:</p><ul><li><a title="All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers" rel="nofollow" href="https://www.ndss-symposium.org/wp-content/uploads/ndss2021_1C-3_23159_paper.pdf">All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers</a> &mdash; Contact discovery allows users of mobile messen- gers to conveniently connect with people in their address book. In this work, we demonstrate that severe privacy issues exist in currently deployed contact discovery methods.
Our study of three popular mobile messengers (WhatsApp, Signal, and Telegram) shows that, contrary to expectations, large- scale crawling attacks are (still) possible. Using an accurate database of mobile phone number prefixes and very few resources, we have queried 10 % of US mobile phone numbers for WhatsApp and 100 % for Signal. For Telegram we find that its API exposes a wide range of sensitive information, even about numbers not registered with the service. We present interesting (cross- messenger) usage statistics, which also reveal that very few users change the default privacy settings. Regarding mitigations, we propose novel techniques to significantly limit the feasibility of our crawling attacks, especially a new incremental contact discovery scheme that strictly improves over Signal’s current approach.
Furthermore, we show that currently deployed hashing-based contact discovery protocols are severely broken by comparing three methods for efficient hash reversal of mobile phone numbers. For this, we also propose a significantly improved rainbow table construction for non-uniformly distributed inputs that is of independent interest.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 9: Off-the-Record Messaging and PKI Implementations!</title>
  <link>https://cryptography.fireside.fm/9</link>
  <guid isPermaLink="false">b20813a0-c3ff-42f1-9e2c-26d027ccd087</guid>
  <pubDate>Fri, 20 Nov 2020 18:00:00 +0100</pubDate>
  <author>Symbolic Software</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/ab43586a-0143-48c8-af78-ac9dc4316514/b20813a0-c3ff-42f1-9e2c-26d027ccd087.mp3" length="60036981" type="audio/mpeg"/>
  <itunes:episode>9</itunes:episode>
  <itunes:title>Episode 9: Off-the-Record Messaging and PKI Implementations!</itunes:title>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Symbolic Software</itunes:author>
  <itunes:subtitle>Sofía Celi of Cloudflare talks about the latest version of Off-the-Record secure messaging protocol, why deniability is important, and more.</itunes:subtitle>
  <itunes:duration>41:41</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/a/ab43586a-0143-48c8-af78-ac9dc4316514/cover.jpg?v=2"/>
  <description>Before there was Signal, before there was WhatsApp, the realm of secure encrypted messaging was ruled by the Off-the-Record secure messaging protocol, created as an alternative to PGP that introduced security properties like forward secrecy and deniability that were considered exotic at the time.
Now, more than a decade later, Off-the-Record messaging, or OTR, has been largely sidelined by Signal variants. But a small team of cryptography engineers is still working on pushing Off-the-Record messaging forward by focusing on use cases that they argue aren’t sufficiently covered by Signal. But what even is deniability, and how much does it matter in the real-world context of secure messaging? Sofía Celi joins us in today’s episode to talk about this and more.
Links and papers discussed in the show:
* OTRv4 (https://github.com/otrv4/otrv4)
Music composed by Toby Fox and performed by Sean Schafianski (https://seanschafianski.bandcamp.com/). Special Guest: Sofía Celi.
</description>
  <itunes:keywords>secure messaging</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Before there was Signal, before there was WhatsApp, the realm of secure encrypted messaging was ruled by the Off-the-Record secure messaging protocol, created as an alternative to PGP that introduced security properties like forward secrecy and deniability that were considered exotic at the time.</p>

<p>Now, more than a decade later, Off-the-Record messaging, or OTR, has been largely sidelined by Signal variants. But a small team of cryptography engineers is still working on pushing Off-the-Record messaging forward by focusing on use cases that they argue aren’t sufficiently covered by Signal. But what even is deniability, and how much does it matter in the real-world context of secure messaging? Sofía Celi joins us in today’s episode to talk about this and more.</p>

<p>Links and papers discussed in the show:</p>

<ul>
<li><a href="https://github.com/otrv4/otrv4" rel="nofollow">OTRv4</a></li>
</ul>

<p>Music composed by Toby Fox and performed by <a href="https://seanschafianski.bandcamp.com/" rel="nofollow">Sean Schafianski</a>.</p><p>Special Guest: Sofía Celi.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://symbolic.software">Symbolic Software</a>: <a rel="nofollow" href="https://symbolic.software">This episode is sponsored by Symbolic Software. Symbolic Software helps you bring in the experience and knowledge necessary to design, or prove secure, state-of-the-art cryptographic systems for new solutions. We've helped design and formally verify some of the world's most widely used cryptographic protocols.</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Before there was Signal, before there was WhatsApp, the realm of secure encrypted messaging was ruled by the Off-the-Record secure messaging protocol, created as an alternative to PGP that introduced security properties like forward secrecy and deniability that were considered exotic at the time.</p>

<p>Now, more than a decade later, Off-the-Record messaging, or OTR, has been largely sidelined by Signal variants. But a small team of cryptography engineers is still working on pushing Off-the-Record messaging forward by focusing on use cases that they argue aren’t sufficiently covered by Signal. But what even is deniability, and how much does it matter in the real-world context of secure messaging? Sofía Celi joins us in today’s episode to talk about this and more.</p>

<p>Links and papers discussed in the show:</p>

<ul>
<li><a href="https://github.com/otrv4/otrv4" rel="nofollow">OTRv4</a></li>
</ul>

<p>Music composed by Toby Fox and performed by <a href="https://seanschafianski.bandcamp.com/" rel="nofollow">Sean Schafianski</a>.</p><p>Special Guest: Sofía Celi.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://symbolic.software">Symbolic Software</a>: <a rel="nofollow" href="https://symbolic.software">This episode is sponsored by Symbolic Software. Symbolic Software helps you bring in the experience and knowledge necessary to design, or prove secure, state-of-the-art cryptographic systems for new solutions. We've helped design and formally verify some of the world's most widely used cryptographic protocols.</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 7: Scaling Up Secure Messaging to Large Groups With MLS!</title>
  <link>https://cryptography.fireside.fm/7</link>
  <guid isPermaLink="false">09e54625-0f32-4b15-a3ae-881d0be8b502</guid>
  <pubDate>Tue, 10 Nov 2020 16:00:00 +0100</pubDate>
  <author>Symbolic Software</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/ab43586a-0143-48c8-af78-ac9dc4316514/09e54625-0f32-4b15-a3ae-881d0be8b502.mp3" length="65056879" type="audio/mpeg"/>
  <itunes:episode>7</itunes:episode>
  <itunes:title>Episode 7: Scaling Up Secure Messaging to Large Groups With MLS!</itunes:title>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Symbolic Software</itunes:author>
  <itunes:subtitle>Raphael Robert from Wire talks about how MLS wants to scale secure messaging to groups with hundreds or even thousands of participants.</itunes:subtitle>
  <itunes:duration>45:10</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/a/ab43586a-0143-48c8-af78-ac9dc4316514/cover.jpg?v=2"/>
  <description>Secure messaging protocols like Signal have succeeded at making end-to-end encryption the norm in messaging more generally. Whether you’re using WhatsApp, Wire, Facebook Messenger’s Secret Chat feature, or Signal itself, you’re benefiting from end-to-end encryption across all of your messages and calls, and it’s so transparent that most users aren’t even aware of it!
One area in which current secure messaging protocols have stalled, however, is the ability to scale secure conversations to groups of dozens, hundreds and even thousands of people. But the IETF’s Messaging Layer Security, or MLS, effort aims to make that happen. Bringing together a collaboration between Wire, Mozilla, Cisco, Facebook, as well as academia, MLS wants to become the TLS of secure messaging, and make it possible to hold secure conversations scaling to thousands of participants.
But what are the real-world implementation risks involved? Are conversations even worth securing when you’ve got hundreds of potential leakers?
Links and papers discussed in the show:
* MLS Website (https://messaginglayersecurity.rocks/)
Music composed by Toby Fox and performed by Sean Schafianski (https://seanschafianski.bandcamp.com/). Special Guest: Raphael Robert.
</description>
  <itunes:keywords>secure messaging</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Secure messaging protocols like Signal have succeeded at making end-to-end encryption the norm in messaging more generally. Whether you’re using WhatsApp, Wire, Facebook Messenger’s Secret Chat feature, or Signal itself, you’re benefiting from end-to-end encryption across all of your messages and calls, and it’s so transparent that most users aren’t even aware of it!</p>

<p>One area in which current secure messaging protocols have stalled, however, is the ability to scale secure conversations to groups of dozens, hundreds and even thousands of people. But the IETF’s Messaging Layer Security, or MLS, effort aims to make that happen. Bringing together a collaboration between Wire, Mozilla, Cisco, Facebook, as well as academia, MLS wants to become the TLS of secure messaging, and make it possible to hold secure conversations scaling to thousands of participants.</p>

<p>But what are the real-world implementation risks involved? Are conversations even worth securing when you’ve got hundreds of potential leakers?</p>

<p>Links and papers discussed in the show:</p>

<ul>
<li><a href="https://messaginglayersecurity.rocks/" rel="nofollow">MLS Website</a></li>
</ul>

<p>Music composed by Toby Fox and performed by <a href="https://seanschafianski.bandcamp.com/" rel="nofollow">Sean Schafianski</a>.</p><p>Special Guest: Raphael Robert.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://symbolic.software">Symbolic Software</a>: <a rel="nofollow" href="https://symbolic.software">This episode is sponsored by Symbolic Software. Symbolic Software helps you bring in the experience and knowledge necessary to design, or prove secure, state-of-the-art cryptographic systems for new solutions. We've helped design and formally verify some of the world's most widely used cryptographic protocols.</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Secure messaging protocols like Signal have succeeded at making end-to-end encryption the norm in messaging more generally. Whether you’re using WhatsApp, Wire, Facebook Messenger’s Secret Chat feature, or Signal itself, you’re benefiting from end-to-end encryption across all of your messages and calls, and it’s so transparent that most users aren’t even aware of it!</p>

<p>One area in which current secure messaging protocols have stalled, however, is the ability to scale secure conversations to groups of dozens, hundreds and even thousands of people. But the IETF’s Messaging Layer Security, or MLS, effort aims to make that happen. Bringing together a collaboration between Wire, Mozilla, Cisco, Facebook, as well as academia, MLS wants to become the TLS of secure messaging, and make it possible to hold secure conversations scaling to thousands of participants.</p>

<p>But what are the real-world implementation risks involved? Are conversations even worth securing when you’ve got hundreds of potential leakers?</p>

<p>Links and papers discussed in the show:</p>

<ul>
<li><a href="https://messaginglayersecurity.rocks/" rel="nofollow">MLS Website</a></li>
</ul>

<p>Music composed by Toby Fox and performed by <a href="https://seanschafianski.bandcamp.com/" rel="nofollow">Sean Schafianski</a>.</p><p>Special Guest: Raphael Robert.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://symbolic.software">Symbolic Software</a>: <a rel="nofollow" href="https://symbolic.software">This episode is sponsored by Symbolic Software. Symbolic Software helps you bring in the experience and knowledge necessary to design, or prove secure, state-of-the-art cryptographic systems for new solutions. We've helped design and formally verify some of the world's most widely used cryptographic protocols.</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
