Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

If an adversary is within bluetooth range of a Briar user what if any data or meta data they are able to gain?

For example, say there is a protest and law enforcement is running devices to capture the Briar data and meta data, what would they be able to record and would it be possible to playback (decrypt) the data at a later point if they were able to capture keys; my understanding is Signal counters playback attacks, but lacks P2P Bluetooth support.

Worth noting that Briar’s Bluetooth support appears to forward data, but not in real-time, so it’s technically not a mesh network; though not sure what you would call what it supports, maybe an asynchronous network?



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: