PDA

View Full Version : Meet the groundbreaking new encryption app set to revolutionize privacy and freak out



JohnQPublic
5th February 2013, 12:50 PM
Sounds interesting, except where it is headquartered is a bit suspicious...

The Threat of Silence Meet the groundbreaking new encryption app set to revolutionize privacy and freak out the feds. By Ryan Gallagher (http://www.slate.com/authors.ryan_gallagher.html)|Posted Monday, Feb. 4, 2013, at 12:21 PM ET


For the past few months, some of the world’s leading cryptographers have been keeping a closely guarded secret about a pioneering new invention. Today, they’ve decided it’s time to tell all.



Back in October, the startup tech firm Silent Circle (https://silentcircle.com/) ruffled governments’ feathers with a “surveillance-proof” smartphone app (http://www.slate.com/articles/technology/future_tense/2012/10/silent_circle_mike_janke_s_iphone_app_makes_encryp tion_easy_governments.single.html) to allow people to make secure phone calls and send texts easily. Now, the company is pushing things even further—with a groundbreaking encrypted data transfer app that will enable people to send files securelyfrom a smartphone or tablet at the touch of a button. (For now, it’s just being released for iPhones and iPads, though Android versions should come soon.) That means photographs, videos, spreadsheets, you name it—sent scrambled from one person to another in a matter of seconds...

...The technology uses a sophisticated peer-to-peer encryption technique that allows users to send encrypted files of up to 60 megabytes through a “Silent Text” app. The sender of the file can set it on a timer so that it will automatically “burn”—deleting it from both devices after a set period of, say, seven minutes. Until now, sending encrypted documents has been frustratingly difficult for anyone who isn’t a sophisticated technology user, requiring knowledge of how to use and install various kinds of specialist software. What Silent Circle has done is to remove these hurdles, essentially democratizing encryption. It’s a game-changer that will almost certainly make life easier and safer for journalists, dissidents, diplomats, and companies trying to evade state surveillance or corporate espionage. Governments pushing (http://www.slate.com/articles/technology/future_tense/2012/08/how_governments_and_telecom_companies_work_togethe r_on_surveillance_laws_.html) for more snooping powers, however, will not be pleased...

...The company, which is headquartered in Washington, D.C., doesn’t retain metadata (such as times and dates calls are made using Silent Circle), and IP server logs showing who is visiting the Silent Circle website are currently held for only seven days. The same privacy-by-design approach will be adopted to protect the security of users’ encrypted files. When a user sends a picture or document, it will be encrypted, digitally “shredded” into thousands of pieces, and temporarily stored in a “Secure Cloud Broker” until it is transmitted to the recipient. Silent Circle, which charges $20 a month for its service, has no way of accessing the encrypted files because the “key” to open them is held on the users’ devices and then deleted after it has been used to open the files....

mamboni
5th February 2013, 02:04 PM
Can you say "backdoor?"

osoab
5th February 2013, 02:34 PM
From an interview with William Binney.


http://civic.mit.edu/blog/schock/the-government-is-profiling-you-william-binney-former-nsa

Q: What about the data center in Utah?

A: The Bluffdale facility. Probably about 5 zetabytes of capacity in the facility. (http://www.democracynow.org/2012/3/21/exposed_inside_the_nsas_largest_and%E2%80%9D) If you eliminate all the video, and analogue audio, and just pick up the material you want, that's enough to store 100 years of the world's communication data. 10 to the 21st bytes.

Q: What if we send things disguised as video?

A: We were talking about this earlier. In my mind: no online cipher is safe. If they don't have the key, they'll come get it from you. Assuming they didn't plant. The safest thing is do all the encryption offline. Then send it. Then decrypt offline.

Q: steganography?

A: That's not safe.

Q: In the 1980s, NSA was doing trigger keywords.

A: Sometimes they attribute more capability than exists. I knew a lot of problems with that - it wasn't useful in an operational sense. Too many mistakes.

Q: A lot of times we hear 'patterns will tell us who the bad guys are.' You're saying, they have all the data and can turn the spotlight on anyone. Is there a system that will tell us predictively who the bad guys are?

A: We had no problem making those decisions. They claimed this as an excuse. They actually wanted to spy on the entire United States.

Down1
5th February 2013, 02:34 PM
Location is bad.

These are the people who made PGP.

Ares
5th February 2013, 02:54 PM
Can you say "backdoor?"

If you generate your own key, where's the back door?

vacuum
5th February 2013, 03:07 PM
I'd never trust anything on an iphone platform. Sure the app may be secure, but isn't it pointless if the OS can send screenshots back to apple?

I doubt they are even sniffing data from the network. Much more likely is that they have a backdoor into the OS.

Shami-Amourae
5th February 2013, 03:24 PM
Only trust open sourced stuff that you can actually see the code...

Like Bitcoin.

mamboni
5th February 2013, 04:37 PM
If you generate your own key, where's the back door?

Some encryption programs have a built in skeleton key, or backdoor. NSA has it and you don't know about it.

joboo
5th February 2013, 04:42 PM
I'd never trust anything on an iphone platform. Sure the app may be secure, but isn't it pointless if the OS can send screenshots back to apple?

I doubt they are even sniffing data from the network. Much more likely is that they have a backdoor into the OS.


This is how Apple got into trouble the first time. Savvy users running full packet detection on the data stream to see exactly what is coming, and going from the phone.

They have to expect people will do this with every o/s release & update because people are.

If the encryption is high enough there is no back door per se. After a certain bit level, it would be more cost effective to have an agent follow you around watching you v.s. the amount of dedicated computer power required.

osoab
5th February 2013, 04:51 PM
I think this is a honey pot.

Here's their logo.

https://silentcircle.com/static/img/silentcircle-logo125.5ae434e97d86.png

Looks a little saturn death cult, bungholish to me. Not to mention the company name "Silent Circle".

Then you have ex-military, guys from nasa... There are a few others, but I don't feel like rereading their bios again.

Hey, it's great that most of these guys created pgp, doesn't mean they didn't give their code to the nsa or developed the code with them. You think they self-funded this?