How SEAL’s Verifiable Phishing Reports Work
Crypto-Detective
3
Posts
3
Posters
3
Views
-

SEAL’s system uses a trusted attestation server as a cryptographic oracle during TLS connections.Researchers can run a proxy to capture connection details, while the server handles encryption/decryption. This produces signed proofs showing what a site truly displayed, helping SEAL confirm phishing attacks without visiting malicious sites directly.