latest
Adversaries
E2EE adversary
Malicious group member
Malicious user
Service provider
Assets
Cipher
Cloud and storage systems
Databases
Identity providers
Keyrings
Messages & Emails
Web applications
Attack vectors
Backdoor
Ghost protocols
Insecure encryption algorithms
Unencrypted backups
Unencrypted metadata
Vulnerable endpoints
Attacks
Chosen ciphertext attack
Chosen plaintext attack
Forgery attack
Impersonation attack
MitM client-to-server HTTPS attack
MitM server-to-server HTTPS attack
Replay attack
Side-channel attack
Threats
Automated verification
Changed message order and delivery
Data tampering
Plaintext leaks
Public keyring identities leakage
TLS/SSL PKI vulnerabilities
Impacts
↑ Backdoors
↑ Usability issues
E2EE messaging threat model
E2EE messaging threat model
Green Team
Improbability Blog
About
Register
Databases
To Be Done
Read the Docs
v: latest
Versions
latest
Downloads
On Read the Docs
Project Home
Builds