

Thanks for the background. I think I’ve heard “camera obscura” before and it didn’t occur to me that “camera” is the shortened form or that it may be related.
I’m probably only B1 in Italian. I am familiar with camera used like “camera da letto”. Granted my vocabulary isn’t huge and I don’t know subtle (and sometimes not so subtle) differences in word meanings. I’m going to look in to this distinction with stanza. Perhaps this interaction will make me remember it better. Thanks!

It says it can’t be decrypted with passive means due to a proper ECDH key exchange, but if they are not doing any sort of verification that theor server sent or created the key, then it would be possible to do an active attack like MITM that manipulates the key exhcnage. What I mean is, your MITM proxy would substitute the real key with one that you have the keypair to and hand that to the target application. The target application then encrypts using the key you provide, your MITM proxy decrypts and reencrypts with the real key and all seems legit from both sides.
If there are server validation of some sort, signature checks or whatever, then it would require extra work like patching out or otherwise modifying those checks in the application, extracting the key from the application’s memory, or something like this.
I guess myvpoint is, if you’re motivated enough, you can make it happen.