Comment by sowbug

14 days ago

They do have stronger schemes, which are called hash functions.

What?

Hashing is not encrypting.

You can learn more about the topic here, https://www.okta.com/identity-101/hashing-vs-encryption/

  • > What?

    > Hashing is not encrypting.

    > You can learn more about the topic here, https://www.okta.com/identity-101/hashing-vs-encryption/

    Thank you for that link. Your original comment implied that Signal's threat model should have included an attacker-controlled end. The only way to do that is to make decryption impossible by anyone, including the intended recipient. A labyrinthine way to do that would be to substitute the symmetric-encryption algorithm with a hash algorithm, which of course destroys the plaintext, but does accomplish the goal of obfuscating it in transit, at rest, and forever.

  • Hashing is a part of encryption, maybe you are the one who needs to shore up on the topic?