
The Evolution of Threat Models for Secure Communication Products
You need to be signed in to add a collection
What happens when a company has to include itself in its threat model? Phil will speak about designing end-to-end secure protocols that are designed to defend against even the secure product vendor and/or the service provider. He will also talk about the recent Efail vulnerabilities that affected S/MIME and PGP mail clients, and how threat models have evolved since PGP was first developed.
Transcript
What happens when a company has to include itself in its threat model? Phil will speak about designing end-to-end secure protocols that are designed to defend against even the secure product vendor and/or the service provider. He will also talk about the recent Efail vulnerabilities that affected S/MIME and PGP mail clients, and how threat models have evolved since PGP was first developed.