MEGA: Malleable Encryption Goes Awry

Date:

In this talk, I present five attacks on the user-controlled end-to-end security MEGA. Our attacks show that a malicious provider can break authentication and compromise file confidentiality and integrity.


The presentation slides are available here.