Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <27ab3990-0d40-67f9-a289-88777a468449@matlink.fr>
Date: Tue, 30 Jul 2019 14:45:51 +0200
From: Matlink <matlink@...link.fr>
To: john-users@...ts.openwall.com
Subject: Re: Question for experienced cryptographers

Hello,

you should first read that:
https://threema.ch/press-files/2_documentation/cryptography_whitepaper.pdf

then you could read security analyses of other messaging protocols like
Signal, and use the same methodology to analyse that one.

Note however that there are some available resources when you search
"threema security analysis" in a search engine, you may first read them.

Le 30/07/2019 à 11:59, Johny Krekan a écrit :
> Hello, I would like to ask whether someone of you (for example 
> Solardesigner as a John author) could estimate what is the real security of 
> an applications like Threema. The webpage states that encryption mechanism 
> used by this software should be secure enough and there is no chance for 
> people to break and decrypt communication between persons which are using 
> this software. What do you think what method could  be used by agencyes to 
> decrypt communication between criminals in Slovakia which are now bein 
> judged in most watched process in this time? The news stated that the 
> threema was used to encode their communication and then the news stated 
> that the communication was succesfully decrypted.
> I am looking to see your opinions about the security of such softwares.
> Nice day
> Johny Krekan

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.