
sovereign Shadow
9.4K posts

sovereign Shadow
@securitybrahh
Teaching ppl how to stay anon since 1984. Privacy Plumber. Constructing Secure Digital Empires. DM's open. Not Security Advice. Breaker of Chains. Ecopolitica.









X has introduced its end-to-end encrypted chat feature for users in the US. This service utilizes the Juicebox protocol, which enables users to secure their encryption keys with a simple, memorable 4-digit PIN. The Juicebox protocol is designed to distribute secrets across various organizations, referred to as realms. The protocol defends against any brute force attack and makes it impossible. The main idea is that there’s no 1) central entity that has all the secrets 2) there’s no offline oracle so it makes brute-forcing impossible. X’s implementation is wrong because they own all the realms (all realms are subdomains of x[.]com). In theory, X could potentially recover the encryption keys and access chat messages. #privacy #cybersecurity #security








