The Evolution of Threat Models for Secure Communication Products
Tuesday Jun 19
09:30 –
10:20
Effectenbeurszaal
This video is also available in the GOTO Play video app! Download it to enjoy offline access to our conference videos while on the move.
What happens when a company has to include itself in its threat model? Phil will speak about designing end-to-end secure protocols that are designed to defend against even the secure product vendor and/or the service provider. He will also talk about the recent Efail vulnerabilities that affected S/MIME and PGP mail clients, and how threat models have evolved since PGP was first developed.