Show HN: TutaCrypt, post-quantum encryption protocols for securing emails [pdf]

  • How does Tutanota work to make sure that TutaCrypt is indeed unbroken or at least so time consuming to break that it is not worth the effort?

    Do you employ cryptographers? Do you have engineers who specialize in security?

    And do you have a process set up for a sort of recovery from a failed encryption implementation?

    edit: that is to say, what is the plan in the event your encryption is proven faulty and your customer's emails are leaked to the public due to this fault?

  • I was all for post-quantum crypto until I heard the news about SIKE being broken with a simple computer.

    How will you make sure this does not happen to the algorithms you chose?

  • [dead]