The Snowden Phone: a Comparative Survey of Secure Instant Messaging Mobile Applications
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Schluss Mit Facebook: Fünf Whatsapp-Alternativen Im Überblick
https://futurezone.at/apps/schluss-mit-facebook-fuenf-whatsapp-alternativen-im-ueberblick/400529764 Apps 23.06.2019 Schluss mit Facebook: Fünf WhatsApp-Alternativen im Überblick Es gibt viele Gründe, WhatsApp abzulehen. Die richtige Messaging-Alternative zu finden, ist aber alles andere als leicht. Es gibt kaum eine App, die im Leben so vieler Menschen eine Rolle spielt wie Whatsapp. 2009 von Jan Koum und Brian Acton gegründet, entwickelte sich der Dienst rasant zu einer Konkurrenz für SMS und andere Messenger, die auf veraltete Protokolle setzten. Zu Beginn war die Anwendung nicht mehr als eine Art schwarzes Brett für Statusmeldungen. Nutzer konnten ihre Gedanken posten, Freunde hatten die Möglichkeit, diese Meldungen zu lesen. Mit der Zeit verwandelten die Entwickler ihre Erfindung in einen Kurznachrichtendienst. Die Vorteile von Whatsapp damals lagen auf der Hand: plattformübergreifende Kommunikation mit dem Smartphone und das auch noch kostenlos. Eine einfache Registrierung und der ebenfalls mögliche Austausch von Fotos und Videos taten das Übrige dazu. Seitdem ist viel Zeit vergangen und in der Welt von WhatsApp hat sich einiges getan. Nach der Übernahme durch Facebook für 19 Milliarden US-Dollar entstanden bei so manchem Nutzer Sorgenfalten. Der Umgang mit Nutzerdaten durch das soziale Netzwerk wurde schon damals kritisch beäugt. Befürchtungen, dass WhatsApp ein ähnliches Schicksal droht, waren alles andere als unbegründet. Zusicherungen, dass sich nichts verändert und die beiden Erfinder das Ruder in der Hand behalten würden, sollten besorgte Nutzer beruhigen. Auch die Implementierung von End-to-End-Verschlüsselung brachte etwas Ruhe. Mittlerweile sind die Gründer aus Unzufriedenheit nicht mehr bei Facebook am Werk, der Zuckerberg-Konzern hat mit der Verschmelzung seiner Plattformen begonnen und bald soll auch Werbung in der App erscheinen. -
Communication and Security Survey Results from US, UK and German Business Leaders
The most secure collaboration platform. Communication and Security Survey results from US, UK and German business leaders Communication and Security Survey | wire.com | February 2019 1 An introduction Every year we ask executives about key topics - this year we chose to focus on communication, security, privacy, and regulation as these have been hot topics in 2018. We asked more than 300 executives from US and Europe about their views on these topics. In addition, please find at the end of this presentation my personal predictions for 2019. We trust you will enjoy the report. Morten Brøgger · CEO Best regards, Morten Brøgger Chief Executive Officer at Wire Communication and Security Survey | wire.com | February 2019 2 Are we still secure? Many organizations have been a …. want their organization to be more proactive victim of a cyberattack and not a 81% in the ways it protects its sensitive information, single respondent disagreed that communication, and/or data. cybersecurity is a major challenge for businesses. Yet while the challenges posed by cybersecurity are understood …. believe security and compliance are key by businesses, some organizations 79% parameters when selecting cloud business aren’t doing enough to prepare. In crisis solutions. situations, in particular, businesses have gaps in their ability to communicate internally and externally in a safe and secure way. …. of organizations don’t have or are unsure if they 38% have, a plan in case of a security breach. …. of respondents said it would be useful to be 83% able to extend a company's secure communication infrastructure to business partners and customers Communication and Security Survey | wire.com | February 2019 3 Emails are popular, Email remains a popular communication to changes in instant messaging but are they tool yet business leaders spend too technology, an overwhelming number much of their time using it. -
Security Analysis of the Signal Protocol Student: Bc
ASSIGNMENT OF MASTER’S THESIS Title: Security Analysis of the Signal Protocol Student: Bc. Jan Rubín Supervisor: Ing. Josef Kokeš Study Programme: Informatics Study Branch: Computer Security Department: Department of Computer Systems Validity: Until the end of summer semester 2018/19 Instructions 1) Research the current instant messaging protocols, describe their properties, with a particular focus on security. 2) Describe the Signal protocol in detail, its usage, structure, and functionality. 3) Select parts of the protocol with a potential for security vulnerabilities. 4) Analyze these parts, particularly the adherence of their code to their documentation. 5) Discuss your findings. Formulate recommendations for the users. References Will be provided by the supervisor. prof. Ing. Róbert Lórencz, CSc. doc. RNDr. Ing. Marcel Jiřina, Ph.D. Head of Department Dean Prague January 27, 2018 Czech Technical University in Prague Faculty of Information Technology Department of Computer Systems Master’s thesis Security Analysis of the Signal Protocol Bc. Jan Rub´ın Supervisor: Ing. Josef Kokeˇs 1st May 2018 Acknowledgements First and foremost, I would like to express my sincere gratitude to my thesis supervisor, Ing. Josef Kokeˇs,for his guidance, engagement, extensive know- ledge, and willingness to meet at our countless consultations. I would also like to thank my brother, Tom´aˇsRub´ın,for proofreading my thesis. I cannot express enough gratitude towards my parents, Lenka and Jaroslav Rub´ınovi, who supported me both morally and financially through my whole studies. Last but not least, this thesis would not be possible without Anna who re- lentlessly supported me when I needed it most. Declaration I hereby declare that the presented thesis is my own work and that I have cited all sources of information in accordance with the Guideline for adhering to ethical principles when elaborating an academic final thesis. -
No.Ntnu:Inspera:2546742.Pdf (10.61Mb)
Krishna Shingala An alternative to the Public Key Krishna Shingala Infrastructure for the Internet of Things Master’s thesis in Communication Technology Supervisor: Danilo Gligoroski, Katina Kralevska, Torstein Heggebø Master’s thesis Master’s June 2019 An alternative to PKI for IoT PKI for to An alternative NTNU Engineering Communication Technology Communication Department of Information Security and Department of Information Faculty of Information Technology and Electrical Technology of Information Faculty Norwegian University of Science and Technology of Science University Norwegian An alternative to the Public Key Infras- tructure for the Internet of Things Krishna Shingala Submission date: June 2019 Responsible professor: Danilo Gligoroski, IIK, NTNU Supervisor: Danilo Gligoroski, IIK, NTNU Co-Supervisor: Katina Kralevska, IIK, NTNU Co-Supervisor: Torstein Heggebø, Nordic Semiconductor ASA Norwegian University of Science and Technology Department of Information Technology and Electrical Engineering Title: An alternative to the Public Key Infrastructure for the Internet of Things Student: Krishna Shingala Problem description: Internet of Things(IoT) enables participation of constrained devices on the Internet. Limited resources, bandwidth, and power on the devices have led to new protocols. Some examples of IoT driven and driving protocols are: – MQTT, CoAP that are application protocols for IoT; – 6LoWPAN enables efficient support of IPv6 on low power lossy networks; – CBOR enables concise data formatting; and – DTLS enables secure channel establishment over unreliable transport like the UDP. Security is one of the key factors for the success of IoT. TLS/DTLS secures the channel between the servers and the devices. Confidentiality is an important aspect of such a secure channel. Establishing the identity of an entity another. -
Use Style: Paper Title
Forensic Investigations of Popular Ephemeral Messaging Applications on Android and iOS Platforms M A Hannan Bin Azhar, Rhys Cox and Aimee Chamberlain School of Engineering, Technology and Design Canterbury Christ Church University Canterbury, United Kingdom e-mail: [email protected]; [email protected]; [email protected]; Abstract—Ephemeral messaging applications are growing It is not just criminals using EMAs. Mobile phones are an increasingly popular on the digital mobile market. However, essential part of modern-day life. According to the Global they are not always used with good intentions. Criminals may System for Mobile Communications [6], there were five see a gateway into private communication with each other billion mobile users in the world by the second quarter of through this transient application data. This could negatively 2017, with a prediction that another 620 million people will impact criminal court cases for evidence, or civil matters. To become mobile phone users by 2020, together that would find out if messages from such applications can indeed be account for almost three quarters of the world population. Due recovered or not, a forensic examination of the device would be to the increasing popularity in mobile phones, there is required by the law enforcement authority. This paper reports naturally an increasing concern over mobile security and how mobile forensic investigations of ephemeral data from a wide range of applications using both proprietary and freeware safe communication between individuals or groups is. It is forensic tools. Both Android and iOS platforms were used in the known that EMAs can be used in civil concerns such as investigation. -
Easy Encryption for Email, Photo, and Other Cloud Services John Seunghyun Koh
Easy Encryption for Email, Photo, and Other Cloud Services John Seunghyun Koh Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy under the Executive Committee of the Graduate School of Arts and Sciences COLUMBIA UNIVERSITY 2021 © 2021 John Seunghyun Koh All Rights Reserved Abstract Easy Encryption for Email, Photo, and Other Cloud Services John Seunghyun Koh Modern users carry mobile devices with them at nearly all times, and this likely has contribut- ed to the rapid growth of private user data—such as emails, photos, and more—stored online in the cloud. Unfortunately, the security of many cloud services for user data is lacking, and the vast amount of user data stored in the cloud is an attractive target for adversaries. Even a single compro- mise of a user’s account yields all its data to attackers. A breach of an unencrypted email account gives the attacker full access to years, even decades, of emails. Ideally, users would encrypt their data to prevent this. However, encrypting data at rest has long been considered too difficult for users, even technical ones, mainly due to the confusing nature of managing cryptographic keys. My thesis is that strong security can be made easy to use through client-side encryption using self-generated per-device cryptographic keys, such that user data in cloud services is well pro- tected, encryption is transparent and largely unnoticeable to users even on multiple devices, and encryption can be used with existing services without any server-side modifications. This dis- sertation introduces a new paradigm for usable cryptographic key management, Per-Device Keys (PDK), and explores how self-generated keys unique to every device can enable new client-side encryption schemes that are compatible with existing online services yet are transparent to users. -
Best Practices for Privileged Access Management on Cloud-Native Infrastructure
Best Practices for Privileged Access Management on Cloud-Native Infrastructure BY GRAVITATIONAL CONTENTS INTRODUCTION ......................................................................................................................................................................... 4 BACKGROUND OF ACCESS MANAGEMENT COMPONENTS ...................................................................................... 5 SSH ............................................................................................................................................................................................. 5 SSH Public Key Authentication ............................................................................................................................................ 5 OpenSSH Certificates ............................................................................................................................................................. 7 OpenSSH Certificate Authentication .................................................................................................................................. 7 LDAP .......................................................................................................................................................................................... 8 Identity Provider ...................................................................................................................................................................... 9 AUTHENTICATION AND AUTHORIZATION ................................................................................................................... -
Challenges in Managing SSH Keys – and a Call for Solutions
Challenges in Managing SSH Keys – and a Call for Solutions Tatu Ylonen University of Helsinki [email protected] Abstract In some cases a single key can access tens of thousands of servers, such as for keys originally installed for emergency SSH (Secure Shell) uses public keys for authenticating servers response, auditing, or patch management purposes. Some of and users. While SSH’s key management design was great these keys are very old. for grass-roots deployments, it is now causing significant Second, extensive monitoring of the usage of the keys has operational and security challenges in large computing envi- revealed that typically about 90% of the authorized keys are ronments. This paper summarizes progress in SSH key man- unused. That is, they are access credentials that were provi- agement so far, highlights outstanding problems, and presents sioned years ago, the need for which ceased to exist or the requirements for a long-term solution. Proposals are solicited person having the private key left, and the authorized key from the research community to address the issue; so far the was never deprovisioned. Thus, the access was not terminated industry has been unable to come up with an ideal solution. when the need for it ceased to exist. This signifies a failure of The problem is of high practical importance, as most of our identify and access management (IAM) practices. critical Internet infrastructure, cloud services, and open source software development is protected using these keys. In many organizations – even very security-conscious or- ganizations – there are many times more obsolete authorized keys than they have employees. -
Maintaining Security and Trust in Large Scale Public Key Infrastructures
Maintaining Security and Trust in Large Scale Public Key Infrastructures Vom Fachbereich Informatik der Technischen Universit¨atDarmstadt genehmigte Dissertation zur Erlangung des Grades Doktor-Ingenieur (Dr.-Ing.) von Dipl. Wirtsch.-Inform. Johannes Braun geboren in Herrenberg. Referenten: Prof. Dr. Johannes Buchmann Prof. Dr. Max M¨uhlh¨auser Tag der Einreichung: 16.03.2015 Tag der m¨undlichen Pr¨ufung: 30.04.2015 Hochschulkennziffer: D 17 Darmstadt 2015 List of Publications [B1] Johannes Braun. Ubiquitous support of multi path probing: Preventing man in the middle attacks on Internet communication. IEEE Conference on Com- munications and Network Security (CNS 2014) - Poster Session, pages 510{ 511, IEEE Computer Society, 2014. Cited on pages 52 and 173. [B2] Johannes Braun, Florian Volk, Jiska Classen, Johannes Buchmann, and Max M¨uhlh¨auser.CA trust management for the Web PKI. Journal of Computer Security, 22: 913{959, IOS Press, 2014. Cited on pages 9, 66, 89, and 104. [B3] Johannes Braun, Johannes Buchmann, Ciaran Mullan, and Alex Wiesmaier. Long term confidentiality: a survey. Designs, Codes and Cryptography, 71(3): 459{478, Springer, 2014. Cited on page 161. [B4] Johannes Braun and Gregor Rynkowski. The potential of an individ- ualized set of trusted CAs: Defending against CA failures in the Web PKI. International Conference on Social Computing (SocialCom) - PAS- SAT 2013, pages 600{605, IEEE Computer Society, 2013. Extended version: http://eprint.iacr.org/2013/275. Cited on pages 9, 32, and 57. [B5] Johannes Braun, Florian Volk, Johannes Buchmann, and Max M¨uhlh¨auser. Trust views for the Web PKI. Public Key Infrastructures, Services and Appli- cations - EuroPKI 2013, vol. -
Perspectives: Improving SSH-Style Host Authentication with Multi-Path Probing
Perspectives: Improving SSH-style Host Authentication with Multi-Path Probing Dan Wendlandt David G. Andersen Adrian Perrig Carnegie Mellon University Abstract Furthermore, a study by Reis et al. used client-side mea- surements to confirm that real-time snooping and modifi- The popularity of “Trust-on-first-use” (Tofu) authentica- cation of web traffic is a reality in today’s networks [20]. tion, used by SSH and HTTPS with self-signed certificates, In this paper, we examine a novel approach to authen- demonstrates significant demand for host authentication ticating a server’s public key. Traditional approaches to that is low-cost and simple to deploy. While Tofu-based server key authentication, such as a public-key infrastruc- applications are a clear improvement over completely inse- ture (PKI) [7, 5], rely on trusted entities (e.g., Verisign) cure protocols, they can leave users vulnerable to even that grant certificates based on the validation of real-world simple network attacks. Our system, PERSPECTIVES, identities. When done securely, such verification requires thwarts many of these attacks by using a collection of “no- significant (often manual) effort. While some network tary” hosts that observes a server’s public key via multiple hosts, primarily commercial websites, can afford to pay network vantage points (detecting localized attacks) and the high verification cost for these certificates, clients have keeps a record of the server’s key over time (recognizing no simple and effective means to authenticate connectivity short-lived attacks). Clients can download these records to most other hosts on the Internet. on-demand and compare them against an unauthenticated Because the high cost of creating and managing a host key, detecting many common attacks. -
Automated Verification for Secure Messaging Protocols and Their
Automated Verification for Secure Messaging Protocols and Their Implementations: A Symbolic and Computational Approach Nadim Kobeissi, Karthikeyan Bhargavan, Bruno Blanchet To cite this version: Nadim Kobeissi, Karthikeyan Bhargavan, Bruno Blanchet. Automated Verification for Secure Mes- saging Protocols and Their Implementations: A Symbolic and Computational Approach. 2nd IEEE European Symposium on Security and Privacy , Apr 2017, Paris, France. pp.435 - 450, 10.1109/Eu- roSP.2017.38. hal-01575923 HAL Id: hal-01575923 https://hal.inria.fr/hal-01575923 Submitted on 21 Aug 2017 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic and Computational Approach Nadim Kobeissi Karthikeyan Bhargavan Bruno Blanchet INRIA Paris INRIA Paris INRIA Paris Abstract—Many popular web applications incorporate end-to- for application-specific messaging patterns and deployment end secure messaging protocols, which seek to ensure that constraints. Such custom protocols deserve close scrutiny, messages sent between users are kept confidential and authen- but their formal security analysis faces several challenges. ticated, even if the web application’s servers are broken into First, web applications often evolve incrementally in an or otherwise compelled into releasing all their data. -
Wire Security Whitepaper
Wire Security Whitepaper Wire Swiss GmbH∗ March 3, 2016 Contents 1 Introduction 2 2 Application layer 2 3 Registration 2 3.1 User Registration . .3 3.1.1 Registration by e-mail . .3 3.1.2 Registration by phone . .3 3.1.3 Passwords . .4 3.1.4 Further data . .4 3.2 Client registration . .4 3.2.1 Further data . .5 3.2.2 Metadata . .6 3.2.3 Notifications . .6 3.3 Push token registration . .6 4 Authentication 6 4.1 Tokens . .6 4.2 Login . .7 4.2.1 Password login . .8 4.2.2 SMS login . .8 4.3 Password Reset . .8 5 Messaging 8 5.1 End-to-end encryption . .9 5.1.1 Prekeys . .9 5.2 Message exchange and client discovery . .9 5.3 Assets . 10 5.4 Notifications . 11 6 Calling 12 6.1 Call signaling . 12 ∗[email protected] 1 6.2 Media transport . 12 6.3 Encryption . 12 6.4 WebRTC . 13 A Cookie and access token format 13 1 Introduction Wire runs on Android and iOS devices, on Windows and OS X as well as on the Web in browsers. Registered users engage in conversations whose contents are synchronized across all devices of a user. This document provides an overview on the cryptographic protocols and security aspects implemented to protect the privacy of users. 2 Application layer Wire clients interact with backend servers over HTTPS connections supporting the following TLS parameters: TLS versions • TLSv1.0 • TLSv1.1 • TLSv1.2 The server indicates the order preference of cipher suites and communicates HTTP Strict Transport Security [2] to all clients.