End-to-end Encrypted Solutions

Comments

Comments are closed.

Enjoyed the talk especially the explanation of the source of vulnerability in SSL and SSH as sign before encrypt or sign and encrypt versus sign after encrypt.

In the future I suggest using CurveCP as a reference design for how to do end to end encryption correctly. Why CurveCP is best practices (or not)

Could you please post a link to the slides.