Skip to content
Better HN
Top
New
Best
Ask
Show
Jobs
Search
⌘K
undefined | Better HN
0 points
ec109685
5y ago
0 comments
Share
They can still write software to insert themselves into the key exchange flow and eavesdrop on a conversation. E.g. I don’t believe there is anything stopping Apple from pretending a participant bought a new device.
0 comments
default
newest
oldest
thebean11
5y ago
That's a much less scary attack vector though, since they would also need to somehow impersonate the participants voice or image right?
upofadown
5y ago
Think of it as aiming a phone at another phone. Apple would decrypt everything and then reencrypt it.
xtian
5y ago
How would they spoof the 2FA from an existing device?
j
/
k
navigate · click thread line to collapse