You are viewing a preview of...
A New Method for End-to-End Encryption
A technique to ensure that only senders and recipients read messages by forcing attackers to leave evidence of any such activity.
With current end-to-end encryption, if an attacker compromises a recipient’s device, they can then put themselves in a position to intercept, read and alter all future communications without sender or recipient ever knowing. Effective end-to-end encryption services have already been developed, but by definition they rely on a device itself remaining secure; once a device has been compromised there’s little that the user can do.
Researchers at the University of Birmingham, in collaboration with the University of Luxembourg and University of Oxford, have developed a technique that ensures that only sender and recipient can read a message. The new protocol forces attackers to leave evidence of any such activity and alerts users to take action.
Log in or create a free account to continue reading