Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Messaging in Times of Surveillance

Messaging in Times of Surveillance

Presented at Security in Times of Surveillance
https://www.win.tue.nl/eipsi/surveillance.html

Frederic Jacobs

May 26, 2016
Tweet

More Decks by Frederic Jacobs

Other Decks in Technology

Transcript

  1. – Ed Snowden "The greatest fear that I have regarding

    the outcome for America of these disclosures is that nothing will change" 2013
  2. – James Clapper "Snowden disclosures sped up adoption of strong

    encryption by about 7 years, according to NSA analysis" 2016
  3. How much (Gmail) email was encrypted in transit? 18% 36%

    54% 72% 90% 2013-12-12 2014-06-11 2014-12-09 2015-06-08 2015-12-25 2016-05-18 Gmail Inbound Gmail Outbound Data Source: Google Transparency Report
  4. SMTP STS: HSTS for email • TOFU trust model •

    Tells email server that encryption is supported, thus emails in future should always be encrypted with • The TOFU trust model doesn’t address an active attacker that can intercept, and downgrade the first connection, removing the STS policy.
  5. You said messaging? • Email environment large & complex to

    operate in. • Messaging apps on mobile & desktop have provided a be:er environment to experiment.
  6. Messaging Landscape in 2013 • WeChat: focuses on Chinese/Asian Market

    - 600 million registered users. • WhatsApp: Worldwide - 590 million registered users. • Facebook Messenger: Worldwide - 500 million registered users. • Line: Asian Market - 300 million registered users. • Viber: Worldwide (popular in the ME) - 200 million registered users.
  7. 2016 End-to-end Crypto in messaging apps • ❌ WeChat •

    ✅ WhatsApp • ❌ Facebook Messenger • ✅ Line • ✅ Viber • A lot of new encrypted messaging platforms were developed since 2013, not all snake oil.
  8. AI/Cloud Chats End-to-End Encrypted Chats Examples WeChat Telegram Google Allo

    Facebook Messenger Viber Signal Threema WhatsApp Telegram Secret Chats Advantages - UX on multi-device provisioning (nothing prevents e-2-e) - Better UX thanks to AI? Security Privacy No selling out or mining of content How useful is the AI? Does the user experience improvement from AI justify the loss of privacy?
  9. If “AI chats” are useful: • Is it possible to

    reconcile “AI chats” with privacy? • How efficient can neural networks be if trained locally? • How can we provide both enough data to train the neural networks on the device and at the same time promote ephemerality?
  10. Alice Master Key Bob Master Key A Message Key 1

    KDF B Message Key 1 KDF … ✉ ✉
  11. Hash-Based Ratcheting • Provides Perfect Forward Secrecy • Simple implementaAon,

    no round trip required • How to deal with out-of-order messages? Keeping a key results in losing PFS from that point. • ⚠ Any key compromise will compromise all future messages
  12. Alice Encrypted Message — Next DH Ephemeral Key ✉ Bob

    ✉ Encrypted Message — Next DH Ephemeral Key Encrypted Message — Next DH Ephemeral Key ✉
  13. DH-Based Ratcheting • Implemented in the OTR protocol • Provides

    Perfect Forward Secrecy • Self-healing properAes • ⚠ Synchronous protocol - not suited for mobile use or high-latency messaging
  14. Message Protocols Session Protocols Examples : PGP, S/MIME Asynchronous Lacks:

    conversation Integrity, forward secrecy, deniability Examples: OTR, SSL, SSH Synchronous Short-lived session Double Ratchet Asynchronous with all great features of short lived protocols Forward secrecy, deniability, conversation integrity …
  15. HI BOB? WOKEN UP ALREADY? MIGHT NEED SOME COFFEE BUT

    I LIKE RATCHING! = Diffie-Hellman Exchange = Hash Function Alice Alice Bob Bob Double-Ratchet
  16. Some things got better • (Free) large scale deployments of

    end-to-end crypto with PFS • Market demand for encrypAon. Services trying to one up each other on security
  17. What got worse • CentralizaAon • PercepAon of security on

    messaging apps might prevent adopAon of more privacy- preserving opAons