Q
Q
qqrkzn2015-05-21 14:13:47
Information Security
qqrkzn, 2015-05-21 14:13:47

What are the possible vectors of attacks on instant messengers?

What possible attack vectors should be considered when designing a secure instant messaging system? What are the requirements for such systems?

Answer the question

In order to leave comments, you need to log in

1 answer(s)
E
evnuh, 2015-05-21
@evnuh

https://www.eff.org/secure-messaging-scorecard#met...

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question