3

I imagine like either leaked or otherwise published official memos on efforts and signals intelligence programs to intercept and crack different types of communications either lamenting or chronicling the technical difficulties in doing so and resultant "blind spots". Or, for example, the spectacular national FBI/Apple controversy in which Apple's compliance or non-cooperation proved ultimately moot as the FBI paid some Israeli consultancy some insane sum to license their encryption cracking package which was able to break it (so we know that these exploits are not only possible, but actually exist).

WhatsApp obviously employs Signal's publicly released encryption code, but its own base is not only proprietary and unaudited, but also is the subject of an embarrassingly endless and regular stream of exploits - suffice to say that security is not its main concern.

Further, it contains such an appalling design oversight as to make it suspicious as to whether it is designed intentionally with this objective in that if cloud backup options are not manually disabled, then all of one's correspondence with all of one's correspondents, regardless of one's correspondents' own settings, is uploaded in plain text to one's storage provider.

Signal is FOSS, and I suppose fully audited, but distributed (and compiled? Signed?) by Apple or Google, depending on the delivery platform. So they could be tampered with by slipstreaming maliciously modified binaries into the distribution channels if one was targeted by court orders and they were ordered to do so.

But even if the binaries as installed are theoretically (ie, by design) meant to be trusted, like signed by the developers' own keys, iOS is so opaque that if there were backdoors then I don't think that anyone would likely even know, especially if they were ordered to target you for malicious/covert surveillance. Presumably the NSA's army of security researchers also have genuine/innocent/candidly overlooked zero day vulnerabilities (in addition to those submitted by independent individuals for cash bounties) in their catalogs at their disposals, too, in the case of both iOS and Android, so that regardless of how secure either Telegram or Signal themselves are in message transmission security, the decryption keys can still be compromised through vulnerabilities in the underlying operating systems.

Between Signal and Telegram, I suppose that last I looked into the matter, both are open source, but only Signal's codebase was audited. There are concerns about Signal's substantial funding by the American foreign policy establishment, and Telegram's Russian origin is perceived in contrast as a more independent provenance, yet nobody ever points out that the Russian backers of the app happen to be virtually as pro-American aligned as Russians these days get.

Telegram had a controversial gung-ho attitude about "rolling its own" crypto functions which many had felt was suspicious. They claimed that it was due to performance concerns with Moxie Marlinspike's librarified Axolotl, which, if honest, precludes any malicious intent to covertly compromise the app's security. It is more robust with a more varied feature set, and it does seem more innovative as well as configurable than Signal. However, people complained that its crypto components were not audited like Signal's were, yet the Telegram developers seemed very confident and proud in their code's integrity, and, as I recall, they said that audits to validate their confidence would come in time. This was years back now. But there was still a further issue that while Telegram was associated with end to end security, by default the chats were actually not encrypted, very arguably coaxing users into a false sense of security. Perhaps the audit has now been done, and perhaps chats are now end-to-end secured by default.

Regardless of speculations as to the implications of all of these factors on actual security, what evidence do we have of the state's abilities in actual practice to intercept and read messages in all of these apps, comparatively and respectively? For example, while we know that it is of course technically possible for even non-smartphones to be remotely activated as listening devices, through the account in Murder in Samarkand, we know some contexts and the conditions and levels of ease or frustration with which it is actually done.

Jackie FJA
  • 39
  • 4
  • 1
    I appreciate that you put a lot of time into this, but it isn't a question: it's mainly a rant. As a result, It's not a great fit for this site. – Conor Mancone Oct 08 '20 at 22:57
  • 1
    No, it definitely all culminates into a question. – Jackie FJA Oct 09 '20 at 00:04
  • Even if they had any difficulty, it would be a terrible move to publicize that, woudn't? – ThoriumBR Oct 09 '20 at 00:46
  • To the closers, how is this unfocused? I think you are confusing promising thorough discussion of caveats examples and background factors with the question itself lacking focus. – Jackie FJA Oct 09 '20 at 00:57
  • 1
    How is it unfocused? It is 7 paragraphs of explanation and speculation, followed by a very broad question that can't be answered, either because nobody can prove a negative, or the answer is classified.—People can make uninformed speculations, but that's not what this site is for. – Ghedipunk Oct 09 '20 at 01:11
  • 1
    It is a good question. I would LOVE to have an answer. That doesn't make it a good fit for Stack Exchange. – Ghedipunk Oct 09 '20 at 01:15
  • 1
    Hi Jackie, so a couple of comments. One of the issues that is contributing to the lack of focus is that you're asking about multiple applications which may elict very different answers. It would be better to limit each question to a single application. Second, it is unclear how the the seven paragraphs of explanation and speculation as you referred to them, constrain and define the question, and they seem to be, if not extraneous, at least in need of editing down into context or constraints on the question, which should otherwise stand on its own. I hope this helps. – Xander Oct 09 '20 at 02:31
  • Well, be my guest in editing it to become suitable and useful. – Jackie FJA Oct 09 '20 at 04:35
  • Your "culminating" question is: "in all of these apps, comparatively and respectively" - that's completely unfocused and too broad. – schroeder Oct 09 '20 at 06:42
  • Regarding WhatsApp, most people use WhatsApp Google Drive backups which can be taken by state surveillance on court order and decrypted by WhatsApp. See [How can WhatsApp restore local or Google Drive Backups?](https://security.stackexchange.com/questions/136072/how-can-whatsapp-restore-local-or-google-drive-backups/238813#238813) – defalt Oct 09 '20 at 07:07
  • @schroeder it is a question focused on the state of turnkey mobile messaging security as a whole. – Jackie FJA Oct 09 '20 at 08:31
  • @JackieFJA right - the state *as a whole* of an ecosystem made up of vastly different apps, approaches, technologies, encryption, etc. That's too unfocused to be asked here. – schroeder Oct 09 '20 at 08:33
  • So, let's say we offer this 'evidence': https://techcrunch.com/2020/07/02/police-roll-up-crime-networks-in-europe-after-infiltrating-popular-encrypted-chat-app/ What does that tell you *ab out the whole*? – schroeder Oct 09 '20 at 08:34

0 Answers0