Topics in this episode:
The emerging threat of quantum computers and their impact on Cryptography
How NIST’s standardization process works, briefly, and why you don’t need to trust NIST at all.
How you might upgrade messaging protocols to the Post-Quantum age
Implementing Post-Quantum key exchanges with deniable signatures
How much metadata can a centralized E2E messaging server record?
If you enjoyed this episode, and want to get notified when the next one arrives, feel free to subscribe:
If you want even more updates, feel free to follow me on Twitter.
Share this post