RT @musalbas@twitter.com
Ian Levy of GCHQ has released an essay on how law enforcement should get access to end-to-end encrypted communications. Here is the critical bit to pay attention to.
They're proposing to exploit the fact that users don't verify each other's public keys, and inject bad keys.