End-to-End Encryption Flashcards

1
Q

End-to-End Encryption

A

System where only the communicating users can read the messages, ensuring no intermediary (like a server) can access the message content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is E2EE important in instant messaging?

A

It prevents servers, routers or intermediaries from accessing the content of messages, protecting user privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a typical architecture of instant messaging without E2EE?

A
  1. Bob and Alice send messages through a central server
  2. Messages between each user and the server are encrypted
  3. Messages are stored and processed in plaintext on the server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What additional data can servers still access with E2EE?

A

Metadata (sender, receiver, timestamps)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the Double Ratchet Algorithm?

A

A protocol ensuring forward secrecy by frequently changing symmetric keys during a conversation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why is forward secrecy important in E2EE?

A

It ensures that if one session key is compromised, past or future messages will remain secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are residual challenges in E2EE?

A
  1. Authentication of endpoints: Verifying the communicating users
  2. Endpoint security: Protecting devices and keys from being compromised
  3. Backdoors: Trust issues with the systems or protocols
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some risks related to encrypted backups?

A
  1. Encryption keys are stored on the cloud (messages in icloud)
  2. Media and messages in Google Drive may not be protected by E2EE
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the “Chat Control” legislation?

A

Proposed laws aiming to balance individual privacy with online policing to combat child sexual abuse content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What cryptographic techniques are used in E2EE protocols?

A
  1. Public-key encryption
  2. Symmetric encryption
  3. Hash functions (authentication and integrity)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an example of a messaging app using E2EE?

A

WhatsApp and Signal both implement E2EE to protect message content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly