Vulnerabilities
New Threat Model Identified for E2E Encrypted Applications
A new threat model has been identified for end-to-end encrypted applications, highlighting vulnerabilities in backup mechanisms that could allow adversaries to infer confidential information through injection attacks.