Matthew Green on Nostr: In the Signal protocol, your communication keys are constantly updated and ...
In the Signal protocol, your communication keys are constantly updated and “ratcheted” forwards. This means that a compromised phone/backup won’t be useful for long. You’ll replace the stolen keys within a few minutes. In iMessage this wasn’t true: public keys were long-lived.
Published at
2024-02-21 15:55:49Event JSON
{
"id": "38f66a07cbc46edad3df112fd274e1ce477c95e166b2cd485b78f76f371f0b63",
"pubkey": "5c06f588380197da5dfbe2e32928b9b6d82c62dac0c602535a09ee1cad5a8221",
"created_at": 1708530949,
"kind": 1,
"tags": [
[
"e",
"24ca747a3d434bfa5b68fbfae36bc036dabb2f896e5dcd48b917822818f56faf",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://ioc.exchange/users/matthew_d_green/statuses/111970284313475397",
"activitypub"
]
],
"content": "In the Signal protocol, your communication keys are constantly updated and “ratcheted” forwards. This means that a compromised phone/backup won’t be useful for long. You’ll replace the stolen keys within a few minutes. In iMessage this wasn’t true: public keys were long-lived.",
"sig": "3714747312d969e1a93cfc25280886ca719ee0ac2ceed97be987db967dbd79415e49ca02898d0267e3daaa8e244381eab6b7a69dbdc6a737734d36095efc5952"
}