Digital Sovereignty & Cyber Security
6.9K views | +0 today
Follow
Digital Sovereignty & Cyber Security
From cyberwar to digital encryption, security issues to state sovereignty
Your new post is loading...
Your new post is loading...
Rescooped by Philippe J DEWOST from cross pond high tech
January 13, 2021 2:38 AM
Scoop.it!

Secure Messaging Apps Comparison

Secure Messaging Apps Comparison | Digital Sovereignty & Cyber Security | Scoop.it

This site compares secure messaging apps from a security & privacy point of view. These include Facebook Messenger, iMessage, Skype, Signal, Google Allo, Threema, Riot, Wire, Telegram, and Wickr. The best secure messaging app?

Philippe J DEWOST's insight:

En plein #WhatsAppGate, Telegram annonce 25 millions de nouveaux inscrits en 72h et franchit la barre du demi-milliard d'utilisateurs actifs.

Au delà des comparaisons simplistes qui ont fait le buzz dans le Kommentariat, laissant accroire qu'il n'y aurait que l'alternative iMessage, Telegram ou Signal, l'offre est nettement plus abondante. D'ailleurs Skype ou Viber ne sont pas nés de la dernière pluie.

D'autres acteurs ne figurent pas encore dans ce tableau, comme #FireChat (qui fonctionne de proche en proche en mode décentralisé), le français Skred de Pierre Bellanger, Olvid, ou encore la messagerie sécurisée #Tchap développée sur base Riot par les pouvoirs publics.

Au delà du #RGPD se pose la vraie question de l'interopérabilité : après tout, une grande partie de ces apps sont parties du protocole open source #XMPPissu de Jabber (et donc d'Orange).

La simplicité est l'autre enjeu, et WhatsApp garde ici un avantage énorme tant il est facile de monter un groupe qu'il soit familial, projet, ou circonstanciel et d'y partager photos et propos.

Mais la simplicité c'est aussi ne pas avoir à se souvenir de l'application sur laquelle avait lieu ma dernière conversation avec vous !

Philippe J DEWOST's curator insight, January 13, 2021 2:37 AM

In the midst of #WhatsAppGate, @Telegram announced 25 million new registrations in the past 72 hours, and more than half a billion active users.

 

Beyond simplistic comparisons buzzing through the #Kommentariat, the offer is much more abundant. Besides, Skype or Viber were not born out of the last rain.

 

While solutions seems to focus on #privacy enforcement, the question of interoperability is another possible avenue : after all, a large number of these apps are based on the open source #XMPP protocol from Jabber (and therefore Orange). Why not enforce some level of interconnection ?

 

Simplicity is the other issue, and there WhatsApp has a huge advantage, given how easy it is to set up a group, whether for a family, project, or circumstantial powwow, and share photos and comments.

 

But simplicity also means not having to remember the application I was using in my last conversation with you !

Philippe J DEWOST's curator insight, January 16, 2021 9:50 AM

WhatsApp and Facebook bend the knee following customer backlash. #WhatsAppGate

https://techcrunch.com/2021/01/15/whatsapp-delays-new-data-sharing-policy-enforcement-to-may-15/

Scooped by Philippe J DEWOST
April 18, 2018 1:47 AM
Scoop.it!

Le gouvernement utilisera sa propre messagerie chiffrée dès cet été

Le gouvernement utilisera sa propre messagerie chiffrée dès cet été | Digital Sovereignty & Cyber Security | Scoop.it

Dès cet été, les hauts fonctionnaires français pourront utiliser une application de messagerie sans crainte d'intrusion. L'Agence nationale de la sécurité des systèmes d'information (Anssi) a en effet confirmé ce mardi que le gouvernement devrait disposer cet été de sa propre messagerie chiffrée, plus sécurisée que les applications privées actuelles.

 

« Ce n'est pas une messagerie secret-défense, c'est une messagerie qui se veut fonctionnelle comme Whatsapp ou Telegram », a expliqué Guillaume Poupard, le directeur général de l'Agence. L'application Whatsapp, propriété de Facebook, est basée aux Etats-Unis, tandis que Telegram, qui a été fondée par deux Russes, les frères Durov, est officiellement enregistrée aux îles Vierges britanniques.

La nouvelle messagerie du gouvernement a été développée par un informaticien de la Direction interministérielle du numérique et du système d'information et de communication de l'Etat (DINSIC) à partir d'un code « open source ». Elle est actuellement testée par une vingtaine de hauts responsables et hauts fonctionnaires.

Des serveurs en France

Le directeur interministériel du numérique Henri Verdier avait évoqué ce projet « avec l'idée qu'il n'y a pas de fatalité à ce que les autorités utilisent des messageries pour lesquelles l'Anssi n'arrête pas de répéter qu'il n'y a pas de confiance », a noté le directeur de l'Anssi.

 

Par exemple, « ce serait bien que les messages échangés par les membres du gouvernement passent par des serveurs hébergés par la Dinsic plutôt que par des serveurs je ne sais trop où ».

Ce projet de « messagerie sécurisée interne à l'Etat » avait déjà été évoqué  vendredi dernier sur France Inter , par le secrétaire d'Etat au Numérique, Mounir Mahjoubi. « Nous travaillons à une messagerie sécurisée publique qui ne sera pas dépendante d'offres privées », avait-il indiqué.

 

Selon la porte-parole du secrétaire d'Etat chargé du numérique, cette messagerie chiffrée pourra, à terme, être mise à la disposition de tous les citoyens français.

Philippe J DEWOST's insight:

Démarche intéressante qui soulève deux questions : quel est le code open source "souche" (licence, dérivations) d'une part, et le type de chiffrement (de bout en bout, accès par des tiers) ? Sinon il y a Skred (by Pierre Bellanger)

No comment yet.
Scooped by Philippe J DEWOST
October 30, 2019 2:19 PM
Scoop.it!

WhatsApp blames — and sues — mobile spyware maker NSO Group over its zero-day calling exploit

WhatsApp blames — and sues — mobile spyware maker NSO Group over its zero-day calling exploit | Digital Sovereignty & Cyber Security | Scoop.it

WhatsApp has filed a suit in federal court accusing Israeli mobile surveillance maker NSO Group of creating an exploit that was used hundreds of times to hack into target’s phone.

The lawsuit, filed in a California federal court, said the mobile surveillance outfit “developed their malware in order to access messages and other communications after they were decrypted” on target devices.

The attack worked by exploiting an audio-calling vulnerability in WhatsApp. Users may  appear to get an ordinary call, but the malware would quietly infect the device with spyware, giving the attackers full access to the device.

In some cases it happened so quickly, the target’s phone may not have rung at all.

Because WhatsApp is end-to-end encrypted, it’s near-impossible to access the messages as they traverse the internet. But in recent years, governments and mobile spyware companies have begun targeting the devices where the messages were sent or received. The logic goes that if you hack the device, you can obtain its data.

That’s what WhatsApp says happened.

WhatsApp, owned by Facebook, quickly patched the vulnerability. Although blame fell fast on NSO Group, WhatsApp did not publicly accuse the company at the time — until now.

In an op-ed posted shortly after the suit was filed, WhatsApp head Will Cathcart said the messaging giant “learned that the attackers used servers and Internet-hosting services that were previously associated” with NSO Group, and that certain WhatsApp accounts used during the attacks were traced back to the company.

“While their attack was highly sophisticated, their attempts to cover their tracks were not entirely successful,” said Cathcart.

The attack involved disguising the malicious code as call settings, allowing the surveillance outfit to deliver the code as if it came from WhatsApp’s signaling servers. Once the malicious calls were delivered to the target’s phone, they “injected the malicious code into the memory of the target device — even when the target did not answer the call,” the complaint read. When the code was run, it sent a request to the surveillance company’s servers, and downloaded additional malware to the target’s device.

In total, some 1,400 targeted devices were affected by the exploit, the lawsuit said.

Most people were unaffected by the WhatsApp exploit. But WhatsApp said that more than 100 human rights defenders, journalists and “other members of civil society” were targeted by the attack.

Other targets included government officials and diplomats.

In a statement, NSO Group said: “In the strongest possible terms, we dispute today’s allegations and will vigorously fight them.”

Philippe J DEWOST's insight:

Nobody will never trust Facebook's WhatsApp privacy promise. Unless the endpoint code is open source.

No comment yet.
Scooped by Philippe J DEWOST
April 5, 2016 4:58 PM
Scoop.it!

Forget Apple vs. the FBI: WhatsApp Just Switched on Encryption for a Billion People

Forget Apple vs. the FBI: WhatsApp Just Switched on Encryption for a Billion People | Digital Sovereignty & Cyber Security | Scoop.it

FOR MOST OF the past six weeks, the biggest story out of Silicon Valley was Apple’s battle with the FBI over a federal order to unlock the iPhone of a mass shooter. The company’s refusal touched off a searing debate over privacy and security in the digital age. But this morning, at a small office in Mountain View, California, three guys made the scope of that enormous debate look kinda small.

Mountain View is home to WhatsApp, an online messaging service now owned by tech giant Facebook, that has grown into one of the world’s most important applications. More than a billion people trade messages, make phone calls, send photos, and swap videos using the service. This means that only Facebook itself runs a larger self-contained communications network. And today, the enigmatic founders of WhatsApp, Brian Acton and Jan Koum, together with a high-minded coder and cryptographer who goes by the pseudonym Moxie Marlinspike, revealed that the company has added end-to-end encryption to every form of communication on its service.

This means that if any group of people uses the latest version of WhatsApp—whether that group spans two people or ten—the service will encrypt all messages, phone calls, photos, and videos moving among them. And that’s true on any phone that runs the app, from iPhones to Android phones to Windows phones to old school Nokia flip phones. With end-to-end encryption in place, not even WhatsApp’s employees can read the data that’s sent across its network. In other words, WhatsApp has no way of complying with a court order demanding access to the content of any message, phone call, photo, or video traveling through its service. Like Apple, WhatsApp is, in practice, stonewalling the federal government, but it’s doing so on a larger front—one that spans roughly a billion devices.

“Building secure products actually makes for a safer world, (though) many people in law enforcement may not agree with that,” says Acton, who was employee number forty-four at Internet giant Yahoo before co-founding WhatsApp in 2009 alongside Koum, one of his old Yahoo colleagues. With encryption, Acton explains, anyone can conduct business or talk to a doctor without worrying about eavesdroppers. With encryption, he says, you can even be a whistleblower—and not worry.

The FBI and the Justice Department declined to comment for this story. But many inside the government and out are sure to take issue with the company’s move. In late 2014, WhatsApp encrypted a portion of its network. In the months since, its service has apparently been used to facilitate criminal acts, including the terrorist attacks on Paris last year. According to The New York Times, as recently as this month, the Justice Department was considering a court case against the company after a wiretap order (still under seal) ran into WhatsApp’s end-to-end encryption.

Philippe J DEWOST's insight:

Rage against the machine, at scale. How will governments react ?

No comment yet.