Get the latest tech news

SecureDrop Protocol


This blog post is a part of a series about our research toward the next generation of the SecureDrop whistleblowing …

SecureDrop Protocol does not preclude scalability, but scaling to mass adoption level (i.e. millions of users) is a nonrequirement for our purposes.The following is a highly simplified comparison of real-world message delivery approaches. The second type of forensic deniability is served by the lack of server-side accounts; the only way to prove that a given party exists is to gain ciphertext addressed to them (a pending message) along with their key material. In November 2023, we engaged cryptographic researcher Michele Orrù for a preliminary audit of the protocol and some of our claimed security properties, with a focus on the server state hiding and message unlinkability.

Get the Android app

Or read this on Hacker News

Read more on:

Photo of protocol

protocol

Photo of SecureDrop Protocol

SecureDrop Protocol

Photo of SecureDrop

SecureDrop

Related news:

News photo

usbredir: A protocol for sending USB device traffic over a network connection

News photo

Ice to treat soft-tissue injuries contraindicated by creator of protocol

News photo

Biggest DDoSes of all time generated by protocol 0-day in HTTP/2 | More than 8 years after the adoption of HTTP/2, DDoSers devise rapid reset attack.