Answer the question
In order to leave comments, you need to log in
What are the possible vectors of attacks on instant messengers?
What possible attack vectors should be considered when designing a secure instant messaging system? What are the requirements for such systems?
Answer the question
In order to leave comments, you need to log in
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question