pgpfan:forward_secrecy
                Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revision | |||
| pgpfan:forward_secrecy [2022/01/06 21:04] – Another victim of the rewrite. b.walzer | pgpfan:forward_secrecy [2022/03/19 21:50] (current) – Redundant, poorly worded. b.walzer | ||
|---|---|---|---|
| Line 4: | Line 4: | ||
| * Some adversary records your encrypted messages and creates an archive of then without your knowledge or consent. | * Some adversary records your encrypted messages and creates an archive of then without your knowledge or consent. | ||
| - | * After any attempts | + | * Optionally the adversary can attempt | 
| - | * They then attack the place this secret key information is stored (usually an end device) to get the information required to decrypt their surreptitious archive of your encrypted messages. | + | * They then attack the place the secret key information is stored (usually an end device) to get the information required to decrypt their surreptitious archive of your encrypted messages. | 
| So starting out we are talking about a two phase attack that requires access to an end point and significant preplanning. | So starting out we are talking about a two phase attack that requires access to an end point and significant preplanning. | ||
pgpfan/forward_secrecy.txt · Last modified:  by b.walzer
                
                