Damus
Alan · 2w
I assume it copies it directly from what exists in storage on my phone. If true then your statement assumes the implemented solution assumes actual perfect forward secrecy. I mean, if it was truly per...
Vitor Pamplona profile picture
Sure.. I find the use of "forward secrecy" terms just marketing bullshit most actual engineers know it only exist in theory. So, to me, that is not a good sales point for Marmot.

I do like the scaling of group sizes, though... But I wouldn't use it because of "forward secrecy"...
1
mleku · 2w
it's not just theory. each message has a particular secret. that secret is derived from other secrets including your nsec. forward secrecy means that an attacker can't find the next secret from the previous. post compromise security means that an attacker can't unravel the backwards path either...