Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Yes, but that "somewhere" could very well be only the two phones involved in a call, with key establishment happening via Diffie-Hellman. Doesn't protect against an active attack, but there's no key to leak inside the network.


Right, let's redesign telecom infrastructure...


After seeing STIR/SHAKEN's implementation details (hey what if we used JWT, and then maximized the metadata leakage of who you're calling), I really do not want to trust telecoms to roll their own crypto.

https://securitycryptographywhatever.com/2024/04/30/stir-sha...


At least they're now only botching protocols instead of self-rolling low-level primitives like block and stream ciphers...




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: