Protocol 2: The Most Secure, Totally-Not-Backdoored, Totally-Licensed-For-Security-Researchers-Only-For-The-Lifetime-Of-The-Internet-Protocol

Overview:

A highly experimental, utterly untrustworthy, totally-not-buggy, and marginally-secure protocol designed specifically for the most discerning, totally-not-NSA-employee security researchers.

Appendix A: Known Vulnerabilities Appendix B: Completely-Not-Compliant Implementations Specification 1: Secure-ish Data Encryption Specification 2: Not-Completely-Implemented-Yet-Still-Broken Authentication

Features:

Known Issues:

Known issues with Protocol 2 include, but are not limited to: