signal protocol – Techdirt (original) (raw)
Musk Does Have Some Good Ideas: Encrypting DMs Would Be Huge, But…
from the it's-not-as-easy-as-he-thinks dept
We’ve been somewhat critical of Elon Musk‘s tenure as Twitter owner and CEO (I think for fairly good reasons), but he does have a few good ideas. Lead among them, wanting to enable encrypted direct messages (DMs). He’s mentioned it before, but also had this slide in a recent internal presentation he gave:
There’s not much to go on with that slide, given that… it just says “Encrypted DMs” and appears to have an image of… existing, unencrypted DMs.
However, Jane Manchun Wong, who is basically a wizard in sniffing out new features and new code being tested on Twitter (and elsewhere) notes that she’s seen snippets of code referencing Signal Protocol for encrypted DMs already showing up inside the Twitter iOS app.
Of course, it appears that’s old code. Like so many things that Elon trots out, these were ideas that Twitter was already exploring, though it did appear that encrypted DMs was shelved. Jane had also spotted encrypted DM testing all the way back in early 2018 as well.
That said, it looks like the new code… is just the old code that Twitter had worked on being dusted off. Former Twitter engineer Brandon Carpenter notes that the code that Jane spotted was really his own code from that 2018 test, quote tweeting Jane and noting “Oh look! Some code I wrote four years ago.”
For what it’s worth, Brandon also laid out one of the issues they had back in 2018, which was in the process of trying to obtain a license from Signal, Moxie Marlinspike, Signal’s founder, ghosted them for weeks when he just decided to go sailing without telling anyone. I’ve seen some people question why anyone would need a license from Signal, considering that Signal Protocol is an open protocol that anyone can use. But, it’s not easy to do it right, and there are many, many reasons to get Signal’s seal of approval before trusting the encryption.
On a… let’s say related note… Twitter’s former Chief Information Security Officer, Lea Kissner wrote out a very interesting and useful thread about the general pitfalls of trying to implement end-to-end encryption, especially in a web app. Suffice it to say it is not easy, and is not something you rush through or things are going to go very, very badly. There are big questions to consider, including how do you handle lost keys, how do you handle stolen keys, how do you handle abuse, and much, much more.
This has all proven challenging for others as well, including Facebook’s very slow efforts to roll out more end-to-end encryption among its various messaging products with a much larger team.
Still, it’s good that Elon considers this important, and one hopes that he can actually get it done, and at least implement less bad answers to some of the many questions that have stymied other teams looking to implement end-to-end encryption. Of course, it may also mean being willing to stand up against government demands and threats regarding encryption, something that we don’t know if Elon is actually willing to do.
On the whole, though, even as he’s made many other mistakes, it’s worth celebrating his stated support for more encrypted messaging.
Filed Under: e2ee, elon musk, encryption, end to end encryption, signal protocol
Companies: signal, twitter
Facebook Experiments With End To End Encryption In Messenger
from the good-to-see dept
This has been rumored before, and perhaps isn’t a huge surprise due to Whatsapp’s use of end to end encryption, but Facebook has launched a trial of end to end encryption in Facebook messenger, under a program it’s calling “Secret Conversations” (which also allows for expiring conversations).
It?s encrypted messages, end-to-end, so that in theory no one?not a snoop on your local network, not an FBI agent with a warrant, not even Facebook itself?can intercept them. For now, the feature will be available only to a small percentage of users for testing; everyone with Facebook Messenger gets it later this summer or in early fall.
What’s good to see is that Facebook is directly admitting that offering end to end encryption is a necessary feature if you’re in the messaging business today.
?It?s table stakes in the industry now for messaging apps to offer this to people,? says Messenger product manager Tony Leach. ?We wanted to make sure we?re doing what we can to make messaging private and secure.?
This is a good sign. For years, tech companies more or less pooh-poohed requests for encryption, basically suggesting it was only tinfoil hat wearing paranoids who really wanted such things. But now they’re definitely coming around (something you can almost certainly thank Ed Snowden for inspiring). And, not surprisingly, Facebook is using the Signal protocol, which is quickly becoming the de facto standard for end to end encrypted messaging. It’s open source, well-known and well-tested, which doesn’t mean it’s perfect (nothing is!), but it’s at least not going to have massively obvious encryption errors that pop up when people try to roll out their own.
Some security folks have been complaining, though, that Facebook decided to make this “opt-in” rather than default. This same complaint cropped up recently when Google announced that end to end encryption would be an “option” on its new Allo messaging app. Some security folks argue — perhaps reasonably — that being optional rather than default almost certainly means that it won’t get enough usage, and some users may be fooled into thinking messages are encrypted when they are not.
Facebook’s Chief Security Officer, Alex Stamos (who knows his shit on these things) took to Twitter (not Facebook?) to explain why its optional, and makes a fairly compelling set of arguments (which also suggest that there’s a chance that end to end encryption will eventually move towards default). A big part of it is that because of the way end to end encryption works (mainly the need to store your key on your local device) that makes it quite difficult to deploy on a system, like Facebook Messenger, that people use from a variety of interfaces. Moxie Marlinspike, the driving force behind Signal has already pointed out that Signal protocol does support multi-device, so hopefully Facebook will figure it out eventually. But in the short term, it would definitely change the way people use Messenger, and it’s at least somewhat understandable that Facebook would be moderately cautious in deploying a change like this that would end up removing some features, and potentially confusing/upsetting many users of the service. Over time, hopefully, end to end encryption can be simplified and rolled out further.
As some cryptogrphers have noted, this is a good start for a company with hundreds of millions of users on an existing platform in moving them towards encryption. A ground up solution probably should have end to end enabled by default, but for a massive platform making the shift, this is a good start and a good move to protect our privacy and security.
Anyway, anyone have the count down clock running on how long until someone from the FBI or Congress whines about Facebook doing this?
Filed Under: encryption, end-to-end encryption, messenger, signal protocol
Companies: facebook