XChat's End-to-End Encryption: The Juicebox Security Flaw

Matthew Garrett exposes security vulnerabilities in X's (formerly Twitter) new end-to-end encrypted messaging protocol, XChat. XChat uses the Juicebox protocol to store user private keys, distributing them across three servers. However, these servers are all controlled by X, meaning X can access all user keys, undermining end-to-end encryption. The article delves into Juicebox's mechanics and potential risks, highlighting critical flaws in XChat's deployment. User private keys are vulnerable to arbitrary access by X, leading to the recommendation to avoid using XChat.
Read more