{"id":31599,"date":"2017-03-08T12:42:44","date_gmt":"2017-03-08T17:42:44","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/dont-let-wikileaks-scare-you-off-of-signal-and-other-encrypted-chat-apps-wired.php"},"modified":"2017-03-08T12:42:44","modified_gmt":"2017-03-08T17:42:44","slug":"dont-let-wikileaks-scare-you-off-of-signal-and-other-encrypted-chat-apps-wired","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/dont-let-wikileaks-scare-you-off-of-signal-and-other-encrypted-chat-apps-wired.php","title":{"rendered":"Don&#8217;t Let WikiLeaks Scare You Off of Signal and Other Encrypted Chat Apps &#8211; WIRED"},"content":{"rendered":"<p><p>          Slide:          1 \/          of 1. Caption: WIRED        <\/p>\n<p>    Of all the revelations to come out of the 9,000-page data dump    of CIA    hacking tools, one of the most explosive is the possibility    that the spy agency can compromise Signal, WhatsApp, and other    encrypted chat apps. If you use those apps, lets be perfectly    clear: Nothing in the WikiLeaks docs says the CIA can do that.  <\/p>\n<p>    A close reading of the descriptions of mobile hacking outlined    in the documents released by WikiLeaks shows that the CIA has    not yet cracked those invaluable encryption tools. That has    done little to prevent confusion on the matter, something    WikiLeaks itself contributed to with a carelessly worded tweet:  <\/p>\n<p>    The end-to-end encryption protocols underpinning    theseprivate messaging apps protect all communications as    they pass between devices. No one, not even the companies    providing the service, can read or see that data while it is in    transit. Nothing in the CIA leak disputes that. The underlying    software remains every bitas trustworthy nowas it    was before WikiLeaks released the documents.  <\/p>\n<p>    Of course, the CIA can compromise the devices sending or    receiving those messages. By taking control of a so-called end    point, spies can access everything on a smartphone, be it    texts, videos, the camera, or the microphone. It isnt about    defeating encryption, despite the hype, says Nicholas    Weaver, a computer security researcher at the International    Computer Science Institute. If you compromise a targets    phone, you dont care about encryption anymore.  <\/p>\n<p>    Its an important distinction. More than a billion people use    Signal and WhatsApp, both of which use Open Whisper Systems    Signal Protocol to protect communications. Other end-to-end    encrypted apps, like Confide, have also seen a recent    uptick in popularity. The people who use these apps rely on    that rock-solid security to facilitatesensitive    discussions, avoid oppressive regimes, communicate    withjournalists, and more. Undermining trust in those    tools creates the impression that vulnerable people have    nowhere to turn. This is not true. They absolutely do.  <\/p>\n<p>    The CIA\/WikiLeaks story today is about getting malware onto    phones, none of the exploits are in Signal or break Signal    Protocol encryption, said Open Whisper Systems in a response    on Twitter. The story isnt about Signal or WhatsApp, but to    the extent that it is, we see it as confirmation that what    were doing is working.  <\/p>\n<p>    The only people who may need to worry are those who might be    the target of a total-device takeover, an exploit largely    limited to nation-state actors. At that point, youve got    farbigger concernsthan end-to-end encrypted chat.    That Signal and WhatsApp are still viable also doesnt lessen    the broader implications of the CIAs secrets being in the    wild.  <\/p>\n<p>    Specifically, users of encrypted comms programs arent    targeted, but everyone is made less safe, says Malwarebytes    security researcher Jean-Phillipe Taggart.  <\/p>\n<p>    Fortunately, WikiLeaksclarified what it meant. After all, it    values the ability to keep secrets as well as anyone.  <\/p>\n<p>    This story has been updated to include a comment from    Jean-Phillipe Taggart.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Go here to see the original:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.wired.com\/2017\/03\/wikileaks-cia-hack-signal-encrypted-chat-apps\/\" title=\"Don't Let WikiLeaks Scare You Off of Signal and Other Encrypted Chat Apps - WIRED\">Don't Let WikiLeaks Scare You Off of Signal and Other Encrypted Chat Apps - WIRED<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Slide: 1 \/ of 1. Caption: WIRED Of all the revelations to come out of the 9,000-page data dump of CIA hacking tools, one of the most explosive is the possibility that the spy agency can compromise Signal, WhatsApp, and other encrypted chat apps. If you use those apps, lets be perfectly clear: Nothing in the WikiLeaks docs says the CIA can do that. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-31599","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/31599"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=31599"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/31599\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=31599"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=31599"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=31599"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}