TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

A Formal Analysis of Apple's iMessage PQ3 Protocol [pdf]

161 pointsby luu10 days ago

3 comments

contact987910 days ago
This is a revision of a paper that first appeared as an eprint back in September when PQ3 was announced.<p><a href="https:&#x2F;&#x2F;eprint.iacr.org&#x2F;2024&#x2F;1395" rel="nofollow">https:&#x2F;&#x2F;eprint.iacr.org&#x2F;2024&#x2F;1395</a>
dang10 days ago
Related. Others?<p><i>iMessage with PQ3 Cryptographic Protocol</i> - <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=39453660">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=39453660</a> - Feb 2024 (267 comments)
modeless10 days ago
All that security, and then by default Apple literally just sends themselves a copy of your encryption keys to store in iCloud backup, the only cloud backup solution Apple allows you to use. &quot;to help you recover your data&quot; [1] (oh and also to send law enforcement your message history in plaintext on request, but we don&#x27;t talk about that).<p>[1] <a href="https:&#x2F;&#x2F;support.apple.com&#x2F;en-us&#x2F;102651#:~:text=in%20iCloud%2C-,your%20backup%20includes%20a%20copy%20of%20the%20Messages%20in%20iCloud%20encryption%20key%20to%20help%20you%20recover%20your%20data,-." rel="nofollow">https:&#x2F;&#x2F;support.apple.com&#x2F;en-us&#x2F;102651#:~:text=in%20iCloud%2...</a>
评论 #43934995 未加载
评论 #43933556 未加载
评论 #43935911 未加载
评论 #43934012 未加载
评论 #43933732 未加载
评论 #43935213 未加载
评论 #43934737 未加载
评论 #43933720 未加载
评论 #43934832 未加载
评论 #43936034 未加载
评论 #43936265 未加载
评论 #43933575 未加载