[Cryptography] Signal planning no support for plaintext SMS

Liam Ayr liam.ayr at icloud.com
Thu Nov 10 20:02:06 EST 2022

> On 11 Nov 2022, at 1:55 am, Shironeko <shironeko at waifu.club> wrote:

> Jerry Leichter <leichter at lrw.com> writes:
>> Now you really are speaking nonsense. They are outright telling you that your
>> password is sufficient to recover your encrypt messages, so any speculation
>> about how the key derivation “relies on other secrets” is just wrong.
> I should have phrased it as “if A then contradiction, or if B then also
> contradiction” rather than just an “and if”
>> As for Apple “reseting your password”:  Where do you see them offering to do that?  If they did, anything encrypted based on that password would be toast.
> <https://support.apple.com/en-us/HT201487>

Head of Apple Security Engineering presented at Blackhat 2016 where he describedd in great detail how iCloud Keychain and the associated backup is achieved without exposing user data to Apple, or anyone else.

Its here https://www.youtube.com/watch?v=BLGFriOKz6U <https://www.youtube.com/watch?v=BLGFriOKz6U>  The relevant part starts at 22:30  He does go quite fast but is thorough. Recommend watching it.

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://www.metzdowd.com/pipermail/cryptography/attachments/20221111/931bb7b5/attachment.htm>

More information about the cryptography mailing list