{"id":56865,"date":"2026-03-26T00:12:00","date_gmt":"2026-03-25T23:12:00","guid":{"rendered":"https:\/\/aboutsignal.com\/?p=56865"},"modified":"2026-03-26T17:20:20","modified_gmt":"2026-03-26T16:20:20","slug":"approfondimenti-su-ultimi-sviluppi-di-crittografia-a-signal-dal-real-world-crypto-symposium","status":"publish","type":"post","link":"https:\/\/aboutsignal.com\/it\/news\/insights-into-the-latest-encryption-developments-at-signal-at-the-real-world-crypto-symposium\/","title":{"rendered":"Approfondimenti sugli ultimi sviluppi in materia di crittografia a Signal, dal Real World Crypto Symposium"},"content":{"rendered":"<p>Alcune settimane fa si \u00e8 svolto il <a href=\"https:\/\/rwc.iacr.org\/\">Real World Crypto Symposium 2026<\/a> a Taipei. Il Real World Crypto Symposium mira a riunire ricercatori nel campo della crittografia e sviluppatori che implementano tali tecnologie in sistemi reali, ed \u00e8 uno dei convegni pi\u00f9 importanti al mondo in materia di crittografia, soprattutto per chi \u00e8 interessato all'applicazione pratica della crittografia.<\/p>\n\n\n\n<p>Alla conferenza di quest'anno molti degli interventi si sono concentrati su Signal, mettendo in luce il ruolo di primo piano che Signal riveste nello sviluppo accademico e pratico della crittografia moderna. Sebbene tutti gli interventi siano disponibili su YouTube, sono inseriti in uno streaming che copre l'intera giornata; pertanto, per chi fosse interessato ai dettagli tecnici di Signal, abbiamo voluto fornire una breve panoramica con i risultati pi\u00f9 importanti e i link diretti alle presentazioni pertinenti.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">A Practical Wrapper Protocol for Metadata-Hiding in Messaging<\/h2>\n\n\n\n<p><em>Lea Thiemt (FAU Erlangen-N\u00fcrnberg), Paul R\u00f6sler (FAU Erlangen-N\u00fcrnberg), Alexander Bienstock (J.P. Morgan AI Research and J.P.<br>Morgan AlgoCRYPT CoE), Rolfe Schmidt (Signal Messenger), Yevgeniy Dodis (New York University)<\/em><\/p>\n\n\n\n<p>Durante questo intervento \u00e8 stata presentata e discussa una versione migliorata della funzione \u201cMittente sigillato\u201d di Signal, sottolineando che Signal sta gi\u00e0 lavorando all'implementazione di questi miglioramenti.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"The Real World Crypto Symposium 2026 ( RWC 2026)- March 9, 2026\" width=\"1080\" height=\"608\" src=\"https:\/\/www.youtube.com\/embed\/QQhyxFj4xJQ?start=947&#038;feature=oembed\"  allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p><a href=\"https:\/\/eprint.iacr.org\/2025\/1619.pdf\">Articolo completo in PDF<\/a><\/p>\n\n\n\n<p><strong>Sintesi in inglese:<\/strong><br>End-to-end encryption in modern messengers ensures the confidentiality of user messages so that network observers or servers cannot learn the content of messages. Even if devices are ever temporarily compromised and encryption keys are leaked, e.g., by trojans or at airport security, the protocols guarantee that past and future communication remains confidential. While confidentiality of protocols has been studied intensively, comparatively little attention was given to the anonymity of protocols. That is, in protocols like Double Ratchet or MLS, not only the ciphertext is transmitted, but also attached metadata, like sender and receiver ID. A server which observes all incoming and outgoing traffic can analyze this metadata to reveal social networks and can ultimately even learn the identity of communicating parties. This is particularly threatening for vulnerable user groups: For instance, journalists who communicate with activists rely on guaranteed anonymity. In fact, the former NSA director, Michael Hayden, made the significance of metadata undoubtedly clear when he said, \u201cWe kill people based on metadata.\u201d<\/p>\n\n\n\n<p>The only widely used messenger, to the best of our knowledge, which currently implements measures to hide metadata is Signal. More concretely, Signal\u2019s Sealed Sender protocol functions as a wrapper protocol around ciphertexts and metadata to provide sender anonymity. While this is a commendable development, Sealed Sender comes with drawbacks. First, the protocol relies on the receiver\u2019s static long term keys. Considering that messaging sessions can last for months or years, it is likely that, at some point, the receiver keys become compromised. This immediately allows de-anonymization of all previous and future communication. Second, Sealed Sender is inefficient in group chats: Without Sealed Sender, the sender creates a constant-size ciphertext which all group members can decrypt. With Sealed Sender, the sender re-encrypts this ciphertext for each recipient, which means that the ciphertext size increases linearly in the number of group members.<\/p>\n\n\n\n<p>In this talk, I present our practical anonymity wrapper protocol which fixes both these drawbacks of Sealed Sender and can be used to hide metadata of existing (group) messaging protocols. The key idea is that the communicating parties use the shared key material of the underlying messaging protocol to derive wrapper keys. In group communication, the resulting ciphertext size is constant. Moreover, our protocol provides strong anonymity guarantees such that, even if encryption secrets are ever compromised, past and future communication remains anonymous. We implement this approach and compare it to Signal\u2019s Sealed Sender: The performance evaluation shows that the wire size of small 1:1 messages goes down from 441 bytes to 114 bytes. For a group of 100 members, it reduces the wire size of outgoing group messages from 7240 bytes to 155 bytes. We see similar improvements in computation time for encryption and decryption, but these improvements come with substantial storage costs for receivers. Yet, by using a Bloom Filter to compress the receiver state, we are able to make this approach practical: Our resulting protocol is efficient and has a storage overhead of only a few hundred bytes for the sender and a few kilobytes for the receiver. Since this significantly improves on the currently deployed Sealed Sender protocol, Signal considers employing this solution.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Signal Lost (Integrity): The Signal App is More than the Sum of its Protocols<\/h2>\n\n\n\n<p><em>Kien Tuong Truong (ETH Zurich), Noemi Terzo (Max-Planck Institute for Security and Privacy), Peter Schwabe (Max-Planck Institute for Security and Privacy), Kenneth Paterson (ETH Zurich)<\/em><\/p>\n\n\n\n<p>In questo intervento \u00e8 stato illustrato un attacco contro Signal in cui un server malintenzionato poteva inserire messaggi in una conversazione. Signal ha risolto il problema immediatamente, prima che i ricercatori rendessero pubblici i risultati delle loro ricerche.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"The Real World Crypto Symposium 2026 ( RWC 2026)- March 9, 2026\" width=\"1080\" height=\"608\" src=\"https:\/\/www.youtube.com\/embed\/QQhyxFj4xJQ?start=4692&#038;feature=oembed\"  allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p><a href=\"https:\/\/eprint.iacr.org\/2026\/484.pdf\">Articolo completo in PDF<\/a><\/p>\n\n\n\n<p><strong>Sintesi in inglese:<br><\/strong>We present an attack against the integrity of conversations in Signal: we show that a malicious server can inject messages into a conversation between two honest users without them being aware of it. The attack does not require any key compromises. While the attack causes the honest users to receive a notification that their safety numbers have changed, those safety numbers remain consistent, so the attack cannot be detected by comparing them out-of-band. This attack naturally gives rise to a number of questions. How was this vulnerability introduced? How can such a vulnerability still be present after the extensive security analysis to which Signal\u2019s protocols have been subjected? What wider lessons can be drawn in order to prevent similar issues arising in the future? We answer these questions in detail in our talk.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Formosa Crypto: End-to-end formally verified crypto software<\/h2>\n\n\n\n<p><em>Jos\u00e9 Bacelar Almeida (Universidade do Minho and INESC TEC) and others<\/em><\/p>\n\n\n\n<p>In questa presentazione \u00e8 stata illustrata la suite di strumenti Formosa Crypto, utilizzabile per lo sviluppo di software crittografico verificato formalmente, e il modo in cui \u00e8 stata impiegata nello sviluppo di Signal.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"The Real World Crypto Symposium 2026 ( RWC 2026)- March 9, 2026\" width=\"1080\" height=\"608\" src=\"https:\/\/www.youtube.com\/embed\/QQhyxFj4xJQ?start=18091&#038;feature=oembed\"  allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Sintesi in inglese:<\/strong><br>In this talk we will present the Formosa Crypto toolchain for end-to-end formally verified crypto software. As a running example we will present a highly optimized implementation of ML-KEM that features computer-verified proofs all the way from assembly to the IND-CCA security notion, together with extensive principled protections against various classes of microarchitectural attacks. We report on the deployment of this ML-KEM software in the backend infrastructure of the Signal secure messenger.<\/p>\n\n\n\n<p>We furthermore report on a separate effort that uses the Formosa toolchain to build high-assurance crypto software for Signal&#8217;s infrastructure, namely an implementation of oblivious RAM (ORAM). This effort provided additional motivation to expedite the integration of Formosa software in Signal, as it discovered a timing vulnerability in the existing C implementation of ORAM in Signal. We will provide details of how this vulnerability was discovered and how the Formosa toolchain systematically protects against such vulnerabilities in a future-proof way.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">XHMQV: Better Efficiency and Stronger Security for Signal&#8217;s Initial Handshake based on HMQV<\/h2>\n\n\n\n<p><em>Rune Fiedler (Technische Universit\u00e4t Darmstadt), Felix G\u00fcnther (IBM Research Europe \u2013 Zurich), Jiaxin Pan (University of Kassel), Runzhi Zeng (University of Kassel), Rolfe Schmidt (Signal Messenger)<\/em><\/p>\n\n\n\n<p>In questa presentazione sono state illustrate alcune idee per migliorare l'handshake iniziale di Signal, al fine di renderlo pi\u00f9 efficiente pur mantenendone le caratteristiche di sicurezza.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.youtube.com\/live\/00zvMSWHoAA?si=5RRVGE_AJVV2NWea&amp;t=18794\">Link al video su YouTube (poich\u00e9 non \u00e8 possibile inserirlo direttamente)<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/eprint.iacr.org\/2025\/1049.pdf\">Articolo completo in PDF<\/a><\/p>\n\n\n\n<p><strong>Sintesi in inglese:<\/strong><br>Signal&#8217;s initial handshake protocol X3DH\/PQXDH allows parties to asynchronously derive a shared session key without the need to be online simultaneously, while providing implicit authentication, forward secrecy, and a form of offline deniability. Extensively studied in the cryptographic literature, it is acclaimed for its strong &#8220;maximum-exposure&#8221; security guarantees, hedging against compromises of users&#8217; long-term keys and medium-term keys but also the ephemeral randomness used in the handshake. Remarkably, Signal&#8217;s current approach of concatenating plain DH combinations is however sub-optimal, both in terms of maximum-exposure security and performance.<\/p>\n\n\n\n<p>In this talk, we will present XHQMV, a carefully adapted variant of Krawczyk&#8217;s well-known HMQV protocol (Crypto &#8217;05), which enables both stronger security and better efficiency while matching the constraints of Signal&#8217;s initial handshake. Notably, HMQV does not work as a drop-in replacement for X3DH due to the the latter&#8217;s asynchronicity requirements and the need to handle cases where one party runs out of ephemeral keys (pre-uploaded to the Signal server). We will show how to augment HQMV with the necessary medium-term keys, enabling security in 1-2 additional compromise scenarios compared to X3DH while using more efficient group operations. Signal plans to adopt XHQMV and in our talk, we will explain how Signal&#8217;s transition to a fully hybrid traditional\/quantum-safe protocol opens a window of opportunity to improve on such a core cryptographic component, and discuss the engineering trade-offs involved.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">A Call to Action: Transitioning Signal&#8217;s Private Group System to Quantum-Safe<\/h2>\n\n\n\n<p><em>Graeme Connell (Signal Messenger), Sebastian Faller (IBM Research &#8211; Zurich, ETH Zurich), Felix G\u00fcnther (IBM Research &#8211; Zurich), Julia Hesse (IBM Research &#8211; Zurich), Vadim Lyubashevsky (IBM Research &#8211; Zurich), Rolfe Schmidt (Signal Messenger)<\/em><\/p>\n\n\n\n<p>In questo intervento sono stati illustrati i lavori attualmente in atto volti a migliorare il sistema dei gruppi privati di Signal e a renderlo sicuro contro potenziali attacchi da parte di computer quantistici.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.youtube.com\/live\/00zvMSWHoAA?si=Pbp2vKyAkwNdKPIy&amp;t=19851\">Link al video su YouTube (poich\u00e9 non \u00e8 possibile inserirlo direttamente)<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/eprint.iacr.org\/2026\/453\">Articolo completo in PDF<\/a><\/p>\n\n\n\n<p><strong>Sintesi in inglese:<\/strong><br>Today&#8217;s real-world cryptographic systems face the challenge of transitioning to quantum-safe, both quickly and efficiently. But what if a system&#8217;s cryptography is so complex that no fully quantum-safe solution exists today, yet the quantum threat of Harvest-Now-Decrypt-Later (HNDL) attacks is already pressing? In this talk, we study such a deployment, Signal&#8217;s Private Group System, and discuss how a careful design analysis can enable transitioning the most vulnerable components first, while maintaining both efficiency and a pathway to full quantum safety.<\/p>\n\n\n\n<p>Signal&#8217;s so-called Private Group System allows users to manage groups (creation, adding\/removing members, etc.) in a privacy-preserving manner, i.e., such that the server never learns the members of the group while simultaneously being able to check the legitimacy of these operations. Signal&#8217;s current system uses an elaborate combination of classical primitives (zero-knowledge proofs, verifiable encryption, oblivious pseudorandom functions, etc.), combined in complex and non-black-box ways. This makes transitioning to quantum-safe challenging, yet such transition is urgent: social graph information and group membership data is highly privacy-sensitive, making Signal&#8217;s Private Group System a primary target for HNDL attacks.<\/p>\n\n\n\n<p>In this talk, we will present ongoing work on transitioning Signal&#8217;s Private Group System. We propose to carefully rethink the design of complex cryptographic systems to focus on countering the HNDL threat first, while keeping a pathway to a fully quantum-safe system open. Our approach reduces the need for advanced building blocks as much as possible and avoids non-black-box use of primitives, e.g., by shifting some responsibilities from the server to the clients. At the example of Signal&#8217;s Private Group System, we will discuss lessons learned and quantum-safe migration strategies that are applicable more broadly to today&#8217;s real-world cryptographic systems.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Resta informato<\/h2>\n\n\n\n<p>Vuoi rimanere aggiornato sulle ultime novit\u00e0 Signal notizie, suggerimenti e aggiornamenti? Seguici su <a href=\"https:\/\/www.threads.com\/@aboutsignal_it\">Threads<\/a>,&nbsp;<a href=\"https:\/\/bsky.app\/profile\/aboutsignalit.bsky.social\" target=\"_blank\" rel=\"noreferrer noopener\">Bluesky<\/a>&nbsp;o&nbsp;<a href=\"https:\/\/mastodon.social\/@aboutsignalit\" target=\"_blank\" rel=\"noreferrer noopener\">Mastodon<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>Panoramica dei punti salienti del Real World Crypto Symposium 2026, con particolare attenzione a Signal e alla crittografia applicata.<\/p>","protected":false},"author":2,"featured_media":56893,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"<!-- wp:paragraph -->\n<p><strong>As we reported last month, Signal is working behind the scenes to expand group management options. In the future, admins will be able to <a href=\"https:\/\/aboutsignal.com\/news\/signal-will-allow-admins-to-delete-messages-from-other-group-members\/\" type=\"post\" id=\"56559\">delete messages from other group members for everyone<\/a>, and now it appears there's even more to come: the ability to end groups for everyone.<\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>The first hints can be found in Signal's source code (GitHub commit <a href=\"https:\/\/github.com\/signalapp\/libsignal\/commit\/c5b3a53c9c7dd7cf1485295ef55e47338ad37663\" type=\"link\" id=\"https:\/\/github.com\/signalapp\/libsignal\/commit\/c5b3a53c9c7dd7cf1485295ef55e47338ad37663\"><\/a><a href=\"https:\/\/github.com\/signalapp\/libsignal\/commit\/c5b3a53c9c7dd7cf1485295ef55e47338ad37663\" type=\"link\" id=\"https:\/\/github.com\/signalapp\/libsignal\/commit\/12d487ffb94c9542c005082efd92b7a0926b9f5d#diff-829a351096230b2c4008409650914030168742cf2e23698eb718d136432ece2cL24-R1141\">c5b3a53<\/a>), which add support in backups for groups that have been terminated. Until now, admins who wanted to end a group could only remove members or leave the group themselves while assigning a new admin.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>In the updated code, Signal introduces a new system message type that records when a group has been terminated. This message appears only in group chats and cannot be modified by other members.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>This indicates that group admins will be able to end Signal groups for everyone. Other group members will then see a notification that the group was ended by an admin. Since this is a group-level feature, it will be available on all platforms: Android, iOS, and Desktop.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:heading -->\n<h2 class=\"wp-block-heading\">Besides ending a Signal group, also delete all messages from phones?<\/h2>\n<!-- \/wp:heading -->\n\n<!-- wp:paragraph -->\n<p>So far, the source code does not provide further details. Notably, this feature is being developed alongside the ability to <a href=\"https:\/\/aboutsignal.com\/news\/signal-will-allow-admins-to-delete-messages-from-other-group-members\/\" type=\"post\" id=\"56559\">delete messages from other group members<\/a>.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Technically, this could make it possible to also delete messages from everyone's devices when ending a group. Whether this is actually Signal's plan is not yet known, but it could be a useful optional feature.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Signal has not yet confirmed the new feature for admins to end groups. The feature is still in an early stage of development, so it may take some time before users can actually use it. As soon as there is more news, you will find it on our website and social media channels.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:heading -->\n<h2 class=\"wp-block-heading\">Stay Informed<\/h2>\n<!-- \/wp:heading -->\n\n<!-- wp:paragraph -->\n<p>Want to stay up to date with the latest Signal news, tips, and updates? Follow us on&nbsp;<a href=\"https:\/\/bsky.app\/profile\/aboutsignal.com\" target=\"_blank\" rel=\"noreferrer noopener\">Bluesky<\/a>&nbsp;or&nbsp;<a href=\"https:\/\/mastodon.social\/@aboutsignal\" target=\"_blank\" rel=\"noreferrer noopener\">Mastodon<\/a>.<\/p>\n<!-- \/wp:paragraph -->","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-56865","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Insights into the latest encryption developments at Signal from the Real World Crypto Symposium<\/title>\n<meta name=\"description\" content=\"Overview of key insights from the Real World Crypto Symposium 2026, focusing on Signal and practical cryptography.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/aboutsignal.com\/it\/notizie\/approfondimenti-su-ultimi-sviluppi-di-crittografia-a-signal-dal-real-world-crypto-symposium\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Insights into the latest encryption developments at Signal from the Real World Crypto Symposium\" \/>\n<meta property=\"og:description\" content=\"Overview of key insights from the Real World Crypto Symposium 2026, focusing on Signal and practical cryptography.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/aboutsignal.com\/it\/notizie\/approfondimenti-su-ultimi-sviluppi-di-crittografia-a-signal-dal-real-world-crypto-symposium\/\" \/>\n<meta property=\"og:site_name\" content=\"AboutSignal\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-25T23:12:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-26T16:20:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/aboutsignal.com\/files\/featured-signal-real-world-crypto-symposium-taipei.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"337\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"AboutSignal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"AboutSignal\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/aboutsignal.com\\\/de\\\/news\\\/insights-into-the-latest-encryption-developments-at-signal-at-the-real-world-crypto-symposium\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/aboutsignal.com\\\/de\\\/news\\\/insights-into-the-latest-encryption-developments-at-signal-at-the-real-world-crypto-symposium\\\/\"},\"author\":{\"name\":\"AboutSignal\",\"@id\":\"https:\\\/\\\/aboutsignal.com\\\/de\\\/#\\\/schema\\\/person\\\/e25cc9abdf7b3fff5bb8090de92c47f4\"},\"headline\":\"Insights into the latest encryption developments at Signal from the Real World Crypto Symposium\",\"datePublished\":\"2026-03-25T23:12:00+00:00\",\"dateModified\":\"2026-03-26T16:20:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/aboutsignal.com\\\/de\\\/news\\\/insights-into-the-latest-encryption-developments-at-signal-at-the-real-world-crypto-symposium\\\/\"},\"wordCount\":1895,\"publisher\":{\"@id\":\"https:\\\/\\\/aboutsignal.com\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/aboutsignal.com\\\/de\\\/news\\\/insights-into-the-latest-encryption-developments-at-signal-at-the-real-world-crypto-symposium\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/aboutsignal.com\\\/files\\\/featured-signal-real-world-crypto-symposium-taipei.png\",\"articleSection\":[\"News\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/aboutsignal.com\\\/de\\\/news\\\/insights-into-the-latest-encryption-developments-at-signal-at-the-real-world-crypto-symposium\\\/\",\"url\":\"https:\\\/\\\/aboutsignal.com\\\/de\\\/news\\\/insights-into-the-latest-encryption-developments-at-signal-at-the-real-world-crypto-symposium\\\/\",\"name\":\"Insights into the latest encryption developments at Signal from the Real World Crypto Symposium\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/aboutsignal.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/aboutsignal.com\\\/de\\\/news\\\/insights-into-the-latest-encryption-developments-at-signal-at-the-real-world-crypto-symposium\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/aboutsignal.com\\\/de\\\/news\\\/insights-into-the-latest-encryption-developments-at-signal-at-the-real-world-crypto-symposium\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/aboutsignal.com\\\/files\\\/featured-signal-real-world-crypto-symposium-taipei.png\",\"datePublished\":\"2026-03-25T23:12:00+00:00\",\"dateModified\":\"2026-03-26T16:20:20+00:00\",\"description\":\"Overview of key insights from the Real World Crypto Symposium 2026, focusing on Signal and practical cryptography.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/aboutsignal.com\\\/de\\\/news\\\/insights-into-the-latest-encryption-developments-at-signal-at-the-real-world-crypto-symposium\\\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/aboutsignal.com\\\/de\\\/news\\\/insights-into-the-latest-encryption-developments-at-signal-at-the-real-world-crypto-symposium\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/aboutsignal.com\\\/de\\\/news\\\/insights-into-the-latest-encryption-developments-at-signal-at-the-real-world-crypto-symposium\\\/#primaryimage\",\"url\":\"https:\\\/\\\/aboutsignal.com\\\/files\\\/featured-signal-real-world-crypto-symposium-taipei.png\",\"contentUrl\":\"https:\\\/\\\/aboutsignal.com\\\/files\\\/featured-signal-real-world-crypto-symposium-taipei.png\",\"width\":600,\"height\":337},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/aboutsignal.com\\\/de\\\/news\\\/insights-into-the-latest-encryption-developments-at-signal-at-the-real-world-crypto-symposium\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/aboutsignal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Insights into the latest encryption developments at Signal from the Real World Crypto Symposium\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/aboutsignal.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/aboutsignal.com\\\/de\\\/\",\"name\":\"AboutSignal\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/aboutsignal.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/aboutsignal.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/aboutsignal.com\\\/de\\\/#organization\",\"name\":\"AboutSignal\",\"url\":\"https:\\\/\\\/aboutsignal.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/aboutsignal.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/aboutsignal.com\\\/files\\\/logo-aboutsignal.png\",\"contentUrl\":\"https:\\\/\\\/aboutsignal.com\\\/files\\\/logo-aboutsignal.png\",\"width\":1024,\"height\":1024,\"caption\":\"AboutSignal\"},\"image\":{\"@id\":\"https:\\\/\\\/aboutsignal.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/aboutsignal.com\\\/de\\\/#\\\/schema\\\/person\\\/e25cc9abdf7b3fff5bb8090de92c47f4\",\"name\":\"AboutSignal\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0a28421bf80ae8816d3bbed7368c16a45a678eef7875d014416e01bf2d5993cf?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0a28421bf80ae8816d3bbed7368c16a45a678eef7875d014416e01bf2d5993cf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0a28421bf80ae8816d3bbed7368c16a45a678eef7875d014416e01bf2d5993cf?s=96&d=mm&r=g\",\"caption\":\"AboutSignal\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Approfondimenti sugli ultimi sviluppi in materia di crittografia a Signal, dal Real World Crypto Symposium","description":"Panoramica dei punti salienti del Real World Crypto Symposium 2026, con particolare attenzione a Signal e alla crittografia applicata.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/aboutsignal.com\/it\/notizie\/approfondimenti-su-ultimi-sviluppi-di-crittografia-a-signal-dal-real-world-crypto-symposium\/","og_locale":"it_IT","og_type":"article","og_title":"Insights into the latest encryption developments at Signal from the Real World Crypto Symposium","og_description":"Overview of key insights from the Real World Crypto Symposium 2026, focusing on Signal and practical cryptography.","og_url":"https:\/\/aboutsignal.com\/it\/notizie\/approfondimenti-su-ultimi-sviluppi-di-crittografia-a-signal-dal-real-world-crypto-symposium\/","og_site_name":"AboutSignal","article_published_time":"2026-03-25T23:12:00+00:00","article_modified_time":"2026-03-26T16:20:20+00:00","og_image":[{"width":600,"height":337,"url":"https:\/\/aboutsignal.com\/files\/featured-signal-real-world-crypto-symposium-taipei.png","type":"image\/png"}],"author":"AboutSignal","twitter_card":"summary_large_image","twitter_misc":{"Scritto da":"AboutSignal","Tempo di lettura stimato":"9 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/aboutsignal.com\/de\/news\/insights-into-the-latest-encryption-developments-at-signal-at-the-real-world-crypto-symposium\/#article","isPartOf":{"@id":"https:\/\/aboutsignal.com\/de\/news\/insights-into-the-latest-encryption-developments-at-signal-at-the-real-world-crypto-symposium\/"},"author":{"name":"AboutSignal","@id":"https:\/\/aboutsignal.com\/de\/#\/schema\/person\/e25cc9abdf7b3fff5bb8090de92c47f4"},"headline":"Insights into the latest encryption developments at Signal from the Real World Crypto Symposium","datePublished":"2026-03-25T23:12:00+00:00","dateModified":"2026-03-26T16:20:20+00:00","mainEntityOfPage":{"@id":"https:\/\/aboutsignal.com\/de\/news\/insights-into-the-latest-encryption-developments-at-signal-at-the-real-world-crypto-symposium\/"},"wordCount":1895,"publisher":{"@id":"https:\/\/aboutsignal.com\/de\/#organization"},"image":{"@id":"https:\/\/aboutsignal.com\/de\/news\/insights-into-the-latest-encryption-developments-at-signal-at-the-real-world-crypto-symposium\/#primaryimage"},"thumbnailUrl":"https:\/\/aboutsignal.com\/files\/featured-signal-real-world-crypto-symposium-taipei.png","articleSection":["News"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/aboutsignal.com\/de\/news\/insights-into-the-latest-encryption-developments-at-signal-at-the-real-world-crypto-symposium\/","url":"https:\/\/aboutsignal.com\/de\/news\/insights-into-the-latest-encryption-developments-at-signal-at-the-real-world-crypto-symposium\/","name":"Approfondimenti sugli ultimi sviluppi in materia di crittografia a Signal, dal Real World Crypto Symposium","isPartOf":{"@id":"https:\/\/aboutsignal.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/aboutsignal.com\/de\/news\/insights-into-the-latest-encryption-developments-at-signal-at-the-real-world-crypto-symposium\/#primaryimage"},"image":{"@id":"https:\/\/aboutsignal.com\/de\/news\/insights-into-the-latest-encryption-developments-at-signal-at-the-real-world-crypto-symposium\/#primaryimage"},"thumbnailUrl":"https:\/\/aboutsignal.com\/files\/featured-signal-real-world-crypto-symposium-taipei.png","datePublished":"2026-03-25T23:12:00+00:00","dateModified":"2026-03-26T16:20:20+00:00","description":"Panoramica dei punti salienti del Real World Crypto Symposium 2026, con particolare attenzione a Signal e alla crittografia applicata.","breadcrumb":{"@id":"https:\/\/aboutsignal.com\/de\/news\/insights-into-the-latest-encryption-developments-at-signal-at-the-real-world-crypto-symposium\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/aboutsignal.com\/de\/news\/insights-into-the-latest-encryption-developments-at-signal-at-the-real-world-crypto-symposium\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/aboutsignal.com\/de\/news\/insights-into-the-latest-encryption-developments-at-signal-at-the-real-world-crypto-symposium\/#primaryimage","url":"https:\/\/aboutsignal.com\/files\/featured-signal-real-world-crypto-symposium-taipei.png","contentUrl":"https:\/\/aboutsignal.com\/files\/featured-signal-real-world-crypto-symposium-taipei.png","width":600,"height":337},{"@type":"BreadcrumbList","@id":"https:\/\/aboutsignal.com\/de\/news\/insights-into-the-latest-encryption-developments-at-signal-at-the-real-world-crypto-symposium\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/aboutsignal.com\/"},{"@type":"ListItem","position":2,"name":"Insights into the latest encryption developments at Signal from the Real World Crypto Symposium"}]},{"@type":"WebSite","@id":"https:\/\/aboutsignal.com\/de\/#website","url":"https:\/\/aboutsignal.com\/de\/","name":"AboutSignal","description":"","publisher":{"@id":"https:\/\/aboutsignal.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/aboutsignal.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/aboutsignal.com\/de\/#organization","name":"AboutSignal","url":"https:\/\/aboutsignal.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/aboutsignal.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/aboutsignal.com\/files\/logo-aboutsignal.png","contentUrl":"https:\/\/aboutsignal.com\/files\/logo-aboutsignal.png","width":1024,"height":1024,"caption":"AboutSignal"},"image":{"@id":"https:\/\/aboutsignal.com\/de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/aboutsignal.com\/de\/#\/schema\/person\/e25cc9abdf7b3fff5bb8090de92c47f4","name":"AboutSignal","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/0a28421bf80ae8816d3bbed7368c16a45a678eef7875d014416e01bf2d5993cf?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0a28421bf80ae8816d3bbed7368c16a45a678eef7875d014416e01bf2d5993cf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0a28421bf80ae8816d3bbed7368c16a45a678eef7875d014416e01bf2d5993cf?s=96&d=mm&r=g","caption":"AboutSignal"}}]}},"_links":{"self":[{"href":"https:\/\/aboutsignal.com\/it\/wp-json\/wp\/v2\/posts\/56865","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aboutsignal.com\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aboutsignal.com\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aboutsignal.com\/it\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/aboutsignal.com\/it\/wp-json\/wp\/v2\/comments?post=56865"}],"version-history":[{"count":21,"href":"https:\/\/aboutsignal.com\/it\/wp-json\/wp\/v2\/posts\/56865\/revisions"}],"predecessor-version":[{"id":56923,"href":"https:\/\/aboutsignal.com\/it\/wp-json\/wp\/v2\/posts\/56865\/revisions\/56923"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/aboutsignal.com\/it\/wp-json\/wp\/v2\/media\/56893"}],"wp:attachment":[{"href":"https:\/\/aboutsignal.com\/it\/wp-json\/wp\/v2\/media?parent=56865"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aboutsignal.com\/it\/wp-json\/wp\/v2\/categories?post=56865"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aboutsignal.com\/it\/wp-json\/wp\/v2\/tags?post=56865"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}