The Evolution of Threat Models for Secure Communication Products
This video is also available in the GOTO Play video app! Download it to enjoy offline access to our conference videos while on the move.
What happens when a company has to include itself in its threat model? Phil will speak about designing end-to-end secure protocols that are designed to defend against even the secure product vendor and/or the service provider. He will also talk about the recent Efail vulnerabilities that affected S/MIME and PGP mail clients, and how threat models have evolved since PGP was first developed.