Update 'content/posts/tech/threema-analysis-of-a-secure-messenger.md'
This commit is contained in:
parent
d3c035d6af
commit
53e4b89c2e
|
@ -13,6 +13,14 @@ cover:
|
|||
alt: "<alt text>"
|
||||
caption: "<text>"
|
||||
---
|
||||
|
||||
[EDIT: 09.01.2023]: Threema [has reacted](https://threema.ch/en/blog/posts/news-alleged-weaknesses-statement) to the publication in bold terms:
|
||||
|
||||
> The [research] paper is based on an old protocol that is no longer in use. The presented findings do not apply to Threema’s current communication protocol “Ibex” or have already been addressed. None of them ever had any considerable real-world impact.
|
||||
|
||||
See how the story develops.
|
||||
|
||||
---
|
||||
Threema is a Swiss encrypted messaging application which has been widely advertised as a secure alternative to Signal, WhatsApp or Wire. Threema claims It has more than 10 million users and more than 7,000 on-premise customers. Prominent users of Threema include the Swiss Government, the Swiss Army and the current Chancellor of Germany, Olaf Scholz.
|
||||
|
||||
A group of academic researchers from the [Applied Cryptography](https://appliedcrypto.ethz.ch/) Group at ETH Zurich (Swiss Federal Institute of Technology) presents [seven attacks against the cryptographic protocols](https://breakingthe3ma.app/) used by Threema in three distinct threat models.
|
||||
|
|
Loading…
Reference in New Issue