Applications

Security properties and analyses of specific applications

Threema

Cryptanalysis uncovering 7 attacks from 3 different vectors

Attack models employed:

  • Network Attacker
  • Compromised Server
  • Compelled Access