

The goal is NOT to compete with highly specialized and peer-reviewed privacy technology. The goal of this is to increase the amount of end-to-end encryption deployed on the Internet that the service operator cannot decrypt (even if compelled by court order) and make E2EE normalized.

If you’re in a hurry, there’s a summary of results at the end.)Īround this time last year, I was writing Going Bark: A Furry’s Guide to End-to-End Encryption and the accompanying TypeScript implementation of the Extended 3-Way Diffie-Hellman authenticated key exchange ( Rawr X3DH). (If you aren’t interested in the background information, feel free to skip to the meat of this post.
