Logo
latest

Adversaries

  • E2EE adversary
  • Malicious group member
  • Malicious user
  • Service provider

Assets

  • Cipher
  • Cloud and storage systems
  • Databases
  • Identity providers
  • Keyrings
  • Messages & Emails
  • Web applications

Attack vectors

  • Backdoor
  • Ghost protocols
  • Insecure encryption algorithms
  • Unencrypted backups
  • Unencrypted metadata
  • Vulnerable endpoints

Attacks

  • Chosen ciphertext attack
  • Chosen plaintext attack
  • Forgery attack
  • Impersonation attack
  • MitM client-to-server HTTPS attack
  • MitM server-to-server HTTPS attack
  • Replay attack
  • Side-channel attack

Threats

  • Automated verification
  • Changed message order and delivery
  • Data tampering
  • Plaintext leaks
  • Public keyring identities leakage
  • TLS/SSL PKI vulnerabilities

Impacts

  • ↑ Backdoors
  • ↑ Usability issues
E2EE messaging threat model
  • E2EE messaging threat model
  • Green Team
  • Improbability Blog
  • About
  • Register

E2EE messaging threat model

After Snowden’s revelation, E2EE received a lot of attentions as a technology to protect user privacy from mass interception and surveillance of communications carried out by governmental organizations such as NSA and GCHQ. Supposedly, end-to-end encryption (E2EE) is a defence against MitM attacks …


Adversaries

  • E2EE adversary
  • Malicious group member
  • Malicious user
  • Service provider

Assets

  • Cipher
  • Cloud and storage systems
  • Databases
  • Identity providers
  • Keyrings
  • Messages & Emails
  • Web applications

Attack vectors

  • Backdoor
  • Ghost protocols
  • Insecure encryption algorithms
  • Unencrypted backups
  • Unencrypted metadata
  • Vulnerable endpoints

Attacks

  • Chosen ciphertext attack
  • Chosen plaintext attack
  • Forgery attack
  • Impersonation attack
  • MitM client-to-server HTTPS attack
  • MitM server-to-server HTTPS attack
  • Replay attack
  • Side-channel attack

Threats

  • Automated verification
  • Changed message order and delivery
  • Data tampering
  • Plaintext leaks
  • Public keyring identities leakage
  • TLS/SSL PKI vulnerabilities

Impacts

  • ↑ Backdoors
  • ↑ Usability issues
Next

Unseen University, 2023, with a forest garden fostered by /ut7.
Read the Docs v: latest
Versions
latest
Downloads
On Read the Docs
Project Home
Builds