Get the latest tech news

A deep-dive explainer on Ink and Switch's BeeKEM protocol


I'm a programmer, designer, writer and artist. I try to make tools for community autonomy, creativity, and resistance.

Since Signal protocol (aka the Double Ratchet algorithm) set a new standard for end-to-end encrypted messaging, there has been a lot of academic focus on abstracting and formalising the key components and pushing them further. Forward secrecy is interesting, like it sounds really important but when I think about what the threat model is, it seems like a rare situation where an attacker would gain access to only the current key but not many if not all past keys/content - like probably directly compromising your device is most likely right? I’m excited for the authors to publish their paper where BeeKEM’s affordances and limitations can be expressed more formally, and to dig into making apps that take advantage of and support the Keyhive project more generally.

Get the Android app

Or read this on Hacker News

Read more on:

Photo of protocol

protocol

Photo of Ink and Switch

Ink and Switch

Photo of dive explainer

dive explainer

Related news:

News photo

Beyond Bluesky: These are the apps building social experiences on the AT Protocol

News photo

Ubisoft launches decentralized verification network with LayerZero’s protocol

News photo

KDE Plasma 6.4 Lands Initial Support For The Wayland Session Restore Protocol