{"id":31368,"date":"2017-02-17T16:40:58","date_gmt":"2017-02-17T21:40:58","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/encrypted-chat-app-wickr-opens-code-for-public-review-techcrunch-techcrunch.php"},"modified":"2017-02-17T16:40:58","modified_gmt":"2017-02-17T21:40:58","slug":"encrypted-chat-app-wickr-opens-code-for-public-review-techcrunch-techcrunch","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/encrypted-chat-app-wickr-opens-code-for-public-review-techcrunch-techcrunch.php","title":{"rendered":"Encrypted chat app Wickr opens code for public review | TechCrunch &#8211; TechCrunch"},"content":{"rendered":"<p><p>    Security researchershave wanted a peek at Wickrs code    since the secure messaging app launched in 2012, and now    theyre finally getting that chance. Wickr is publishing its    code for Wickr Professional, the subscription-based enterprise    version of its free messaging app, today for public review.  <\/p>\n<p>    The public review builds on private third party code reviews by    security experts like Dan Kaminsky and Whitfield Diffie, and    has been a long time in the making for Wickr.  <\/p>\n<p>    For years, Wickr has been at the forefront of ephemeral    communication. With Wickr Professional, they are allowing teams    to be confident that what is discussed is not distributed. And    by opening their code, they are giving the engineering    community strong reasons to trust their platform, Kaminsky    said in a statement.  <\/p>\n<p>    Users might not be interested in the inner workings of most of    the apps they use, but for encrypted messaging, trust is    paramount. Users need to know that the apps security claims    are verified  that theres math behind the marketing  and so    its common for the makers of encryption products to make their    code available for public inspection. This makes it possible    for experts to reassure users that their messages are private,    and lets researchers hunt for bugs that could make the app less    secure.  <\/p>\n<p>    But Wickr hasnt gone open-source  until now. Thats made it    tough for Wickr to gain the trust of the most privacy-conscious    users. The Electronic Frontier Foundation marked Wickr down in    a 2015 edition of its Secure Messaging Scorecard    because the company had no public documentation of their    encryption protocol and had not made their code available for    review.  <\/p>\n<p>    Wickr tried to strike a balance later that year, when it    published a white paper describing its methods. But the company    still stopped short of making its code public.  <\/p>\n<p>    After all, Wickr is a business, andits easy to see how    offering up code for free could cut into the companys profit.    But Signal, a competing encrypted messaging app that has surged    in popularity, has open-sourced its code from the beginning.    Google, Facebook, and WhatsApp all implemented Signals    encrypted messaging protocol in their own apps last year,    demonstrating that open-source doesnt inherently harm a    companys growth.  <\/p>\n<p>    Joel Wallenstrom, who joined Wickr as CEO in Nov. 2016, says    thathis willingness to publish the code is based on what    he sees as a change in the way Wickr competes in the    marketplace.  <\/p>\n<p>    Where were going to compete is really good customer service    and customer support, Wallenstrom tells TechCrunch. Id like    to collaborate on crypto and really go out there and stake our    claim in the marketplace by helping people understand how to    use ephemeral communications. The next thing is, how does a    general counsel really understand and wrap his or her brain    around how to use this? How does this work within our    organization? These are big challenges. People are looking to    us and maybe to others as well, saying, I need help with that    part too, not just the math.'  <\/p>\n<p>    Wallenstrom also wanted to please the security community, which    has embraced open-source as a way to ensure the integrity of    encrypted communication. It was important to some    corporations, and it was very important to the security    community, obviously, Wallenstrom says. What I found is that    Wickr messenger users typically are in the security community    and there was just a big, Why not?'  <\/p>\n<p>    The encryption protocol Wickr releasedtoday is only used    in Wickr Professional, an enterprise messaging service the    company launched in private beta last month. (Think of    Professional as the encrypted and ephemeral competitor of    Slack.) Wickr Professional allows group chats of up to 30    people and enables file transfers, calls, and video chat. The    company also offers SCIF, an enterprise product that enforces    rapid destruction of messages. Professional and SCIF will be    available for an annual subscription fee, while Wickrs main    chat app will remain free.  <\/p>\n<p>    The protocol used in Wickr Me, the free app for iOS and    Android, is still closed-source. Wallenstrom says that the    open-source protocol will be implemented in Wickr Me as soon as    possible, but for now the company is focused on its enterprise    offering.  <\/p>\n<p>    This is a multi-party, multi-device protocol, explains Tom    Leavy, one of the creators of the protocol.  <\/p>\n<p>    Wickr launched as a one-to-one communication service, allowing    a single user with a single device to securely chat with    another user. But over time, usershave begun to use more    devices and gravitate toward group chat, so Wickr added those    features too. But these featurescan cause problems for    encrypted messaging because of the slow, sometimes data-heavy    process of key exchange and encryption.  <\/p>\n<p>    We collected a lot of overhead, to the point where it was    becoming difficult to scale, Leavy says. For Professional, we    had an opportunity to say, Okay, lets take apart all the    components here and really decide what operations need to    happen in order to maintain end-to-end encryption between all    the parties. The end result of that process was figuring out    that there was a lot of replication of data and calculations in    the key exchange and we were able to get a 50 percent reduction    in larger group chats in the size of the message.  <\/p>\n<p>    The result is a faster, more agile protocol that Wickr hopes    will attract enterprise customers who are warming up to the    idea of encrypted communication but want more hands-on customer    support than other apps can offer. Researchers who find errors    or security vulnerabilities in the code can report the problems    through Github and Wickrs vulnerability disclosure program.  <\/p>\n<p>    The best way for us to understand what were going to be doing    ten years from now is to be part of this dialogue, Wallenstrom    says.  <\/p>\n<p>    You can read Wickr Professionals white paper below and check    out the code on Github.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Go here to see the original:<br \/>\n<a target=\"_blank\" href=\"https:\/\/techcrunch.com\/2017\/02\/15\/encrypted-chat-app-wickr-opens-code-for-public-review\/\" title=\"Encrypted chat app Wickr opens code for public review | TechCrunch - TechCrunch\">Encrypted chat app Wickr opens code for public review | TechCrunch - TechCrunch<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Security researchershave wanted a peek at Wickrs code since the secure messaging app launched in 2012, and now theyre finally getting that chance. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-31368","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/31368"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=31368"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/31368\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=31368"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=31368"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=31368"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}