An Illustrative Inventory of Widely- Available Encryption Applications Kevin Bankston, Ross Schulman, and Jake Laperruque
Total Page:16
File Type:pdf, Size:1020Kb
NEW AMERICA An Illustrative Inventory of Widely- Available Encryption Applications Kevin Bankston, Ross Schulman, and Jake Laperruque out ofout the safeofout the encryption safeofout the encryption apps safeofout wouldthe encryption apps safe beofout wouldthe encryption apps safe beofout wouldthe encryption appssafe beofout wouldthe encryption apps safe beof wouldthe encryption apps safe be would encryption apps be would apps be would be onlyonly1 ofonly91a e edofonly91 bya e edof USonly9 government1 bya e edof USonly9 government1 byregulationa e edof USonly9 government1 byregulationa e ed of USonly9 government1 bya e edregulationout of US9 government1 byregulationa e ed ofof US the9 government encrypted byregulationa e ed US government apps regulationby US reportedly government regulation identified regulation as ‘safe’ or Only 1 of 9 ‘safest’ by ISIS would be affected by regulation in the U.S. When it comes to encryption, the genie is out of the When it comes to encryption, the horse is out of bottle. But encryption isn’t magic. It’s math, and the barn, the ship has sailed, and the toothpaste very well-known math at that. The basic principles isn’t going back in the tube. The math, and the behind modern end-to-end encryption of digital technology, is already out there. Therefore, any messages, where only the recipient of the message attempt by the U.S. government to pressure U.S. can decode it, are nearly four decades old.1 companies to redesign their end-to-end encrypted services so that they have the keys necessary to U.S. companies like Apple and Facebook, providers decrypt the communications—which is really just of the encrypted messaging services iMessage and another way of saying “stop deploying end-to-end WhatsApp, don’t have a monopoly on strong end- encryption”—would be futile. There are plenty of to-end encryption tools. Strong encryption tools other reasons why anti-encryption regulation would are everywhere, and over a billion ordinary people be bad for America, which we’ve laid out many around the world rely on them every day. times over the past year in Congressional testimony, research papers, blog posts, op-eds and more.5 There are countless applications that are freely available online, across the globe, with unbreakable But the biggest reason is just this: anti-encryption end-to-end encryption. The vast majority of those regulation will not make us safer. It’s all cost, no applications are either “open source” software that benefit. anyone is free to use, review, copy or build on,2 and/or are offered by companies, organizations or developers outside of the United States. In fact, it’s Surveillance backdoors are a lose- so easy to create new end-to-end encryption apps, lose proposition: they won’t make jihadists have been coding their very own secure messaging tools since at least 2007, tools with the terrorists less secure, only names like Mujahadeen Secrets and Security of the ourselves—and former heads of the Mujahid.3 Another app that terrorists are claimed to DHS, NSA and CIA agree. have used, Telegram, is based in Berlin.4 The Crypto Cat is Out of the Bag 1 A surveillance backdoor into U.S. products will We agree with former Director McConnell that not stop terrorists from using other end-to-end the encryption genie is out of the bottle, as encryption tools that are widely available online demonstrated by the following charts. That’s why around the world. It will only discourage a lot of the White House and Congress should sensibly normal, law-abiding Americans from using it, while reject any calls to regulate the availability of strong also discouraging international users from relying encryption tools, just as they did 20 years ago.8 on U.S. products that have been rendered less secure. Surveillance backdoors are a lose-lose The figure below is adapted from a chart that proposition: they won’t make the terrorists less reportedly came from an ISIS information security secure, only ourselves—and former heads of the training manual, which identified encrypted DHS, NSA and CIA agree.6 messaging applications that were thought to be “safe” and “safest” (as opposed to “moderately As former NSA Director and Director of National safe” or “unsafe”).9 As you’ll see, all of the Intelligence Mike McConnell puts it, rather encryption apps considered “safest” by ISIS are than trying to fight the inevitable, government open source, foreign-based, or both, as are three investigators need to adapt to a world with out of the four apps considered “safe”. Therefore, of widespread encryption: the nine apps recommended as “safe” or “safest”, eight of them are outside of U.S. regulation’s reach. “Don’t get in the way of pro gress. Don’t get in the way of in nov a tion and cre ativ ity, be cause The second figure is an illustrative inventory of the this is go ing to hap pen. Some body’s go ing many popular, easy to get, easy to use end-to-end to provide this en cryp tion.” Therefore, law encryption tools available right now that are either enforcement must “adapt,” says McConnell. “If open source, developed outside of the US, or both, law en force ment starts to change the way they and would therefore be minimally affected if at think about this, I think there are many, many all by U.S. legislation or action by U.S. companies. ways to carry out the mis sion, giv en that you In sum, it describes sixteen popular apps for fully are faced with a situ ation where tech no logy is encrypted email, chat, messaging or voice calls not go ing to be re versed.”7 that are outside of U.S. regulation’s reach. ISIS’ Favorite Encryption Apps are Open Source, Foreign-Based, or Both10 Apps Labeled Safest by ISIS Key OSTel Signal Open Source ChatSecure Silent Circle11 Open Source and Foreign Redphone12 Under U.S. Regulation Apps Labeled Safe by ISIS Surespot Telegram Wickr Threema 2 OPEN TECHNOLOGY INSTITUTE An Illustrative Inventory of End-to-End Encrypted Applications that are Open Source, Foreign-Based, or Both Is App Company or What does it What operating systems Is Company or Org App Open Organization encrypt? is it available on? U.S. Based? Source? N/A; Adium is an open Instant No; Adium is an open Mac Yes Adium development project messaging development project The Guardian Project (nonprofit research Chat iPhone and Android Yes Yes ChatSecure and development organization) iPhone, Mac, and via N/A; Cryptocat is an No; Cryptocat is an a web application for open development Chat Yes open development Cryptocat Chrome, Firefox, and project project Safari browsers N/A; GnuPG is an open No; GnuPG is an open Email Linux Yes GnuPG development project development project No; Intevation GmbH Intevation GmbH and and G10 Code GmbH Email Windows PC Yes Gpg4win G10 Code GmbH are German-based companies N/A; GPGTools is an No; GPGTools is an GPGTools open development Email Mac Yes open development project project Android devices, N/A; Jitsi is an open Voice calls and No; Jitsi is an open Windows PC, Mac, and Yes Jitsi development project text messaging development project Linux No; Mailvelope GmbH Mailvelope Mailvelope GmbH Email Web application Yes is a German-based company The Guardian Project iPhone, Android devices, (nonprofit research Voice calls Blackberry, Windows PC, Yes Yes Ostel and development Mac, and Linux organization) N/A; Pidgin is an open Instant No; Pidgen is an open Windows pC and Linux Yes Pidgin development project messaging development project N/A; RetroShare is an No; RetroShare is an Text messaging Mac, Windows PC, and open development Yes open development RetroShare and email Linux project project Voice calls and Open Whisper Systems iPhone and Android Yes Yes Signal text messaging No; Silent Circle Voice calls and Silent Silent Circle iPhone and Android Yes is a Swiss-based text messaging Phone company iPhone and Android Surespot, LLC Text messaging Yes Yes Surespot devices iPhone, iPad, Android No; Telegram devices, Windows Phone, Messenger is a Telegram Messenger Text messaging Partially Telegram Windows PC, Mac, Linux, German-based and via web application company No; Threema GmbH Threema Threema GmbH Text messaging iPhone and Android Yes is a Swiss-based company The Crypto Cat is Out of the Bag 3 Notes 1. The foundational work in this area began with com/read/former-nsa-chief-strongly-disagrees-with- Whitfield Diffie and Martin Hellman’s New Directions in current-nsa-chief-on-encryption. Cryptography, IEEE Transactions in Information Theory 7. Kaveh Wadell, The National Journal, Former (Nov. 6, 1976), available at http://www-ee.stanford. Intelligence Director: Law Enforcement Must edu/~hellman/publications/24.pdf. “Adapt” to Encryption (October 1, 2015), available at 2. Open-source software (OSS) is computer software http://www.nationaljournal.com/s/74230/former- with its source code made available with a license intelligence-director-law-enforcement-must-adapt- in which the copyright holder provides the rights encryption. to study, change, and distribute the software to 8. Danielle Kehl, Andi Wilson, and Kevin Bankston, anyone and for any purpose. Open-source software Doomed to Repeat History? Lessons From The may be developed in a collaborative public manner,” Crypto Wars of the 1990s, New America’s Open which we refer to below as “open development”. Technology Institute, June 2015, available at See Wikipedia, Open-source softare (last modified https://static.newamerica.org/attachments/3407- December 7, 2015), available at https://en.wikipedia. doomed-to-repeat-history-lessons-from-the- org/wiki/Open-source_software. Even the encryption crypto-wars-of-the-1990s/OTI_Crypto_Wars_History.