Show Posts
|
Pages: [1]
|
1
|
Alternate cryptocurrencies / Service Announcements (Altcoins) / Re: Gadget for private communication
|
on: February 24, 2018, 04:31:13 PM
|
In E2EE, the data is encrypted on the sender's system or device and only the recipient is able to decrypt it. Nobody in between, be they an Internet service provider, application service provider or hacker, can read it or tamper with it.
The cryptographic keys used to encrypt and decrypt the messages are stored exclusively on the endpoints, a trick made possible through the use of public key encryption. Although the key exchange in this scenario is considered unbreakable using known algorithms and currently obtainable computing power, there are at least two potential weaknesses that exist outside of the mathematics. First, each endpoint must obtain the public key of the other endpoint, but a would-be attacker who could provide one or both endpoints with the attacker's public key could execute a man-in-the-middle attack. Additionally, all bets are off if either endpoint has been compromised such that the attacker can see messages before and after they have been encrypted or decrypted.
|
|
|
3
|
Alternate cryptocurrencies / Service Announcements (Altcoins) / Re: Gadget for private communication
|
on: February 23, 2018, 07:05:02 PM
|
These are some reasons why instant messenger security is so important. Once a hacker gets into a computer, he or she can send a password stealing virus. This virus will steal the password and other useful information and send it back to the hacker in a variety of ways. With account information and passwords, a hacker can hijack or impersonate a client or co-worker. If a hacker is successful, he or she will attack all the individuals who are allowed to send and retrieve instant messages to first victim. This is why instant messenger security is very important. Another method that a hacker can use to steal information is through log files. Log files are created to store and send the messages through an instant messaging service. These files can be sent back to the hacker, so that he or she can access them.
|
|
|
|