[Cryptography] Signal Security / Secure Chat Metadata Traffic Analysis Generally
Ray Dillinger
bear at sonic.net
Thu Nov 2 19:40:09 EDT 2023
On 10/29/23 01:42, arxlight wrote:
> I don't want to lead too severely any discussion that might follow
> here but I found it rather interesting that over the course of a few
> days in November of 2022, Signal's Auto Deletion feature was,
> according to the document, turned off on dozens of the 325 listed
> groups. Perhaps some panicked compliance official persuaded the FTX
> team (or SBF himself?) that this feature was legally dangerous? As far
> as I can tell, Joe Bankman was the only actual lawyer listed as a
> participant in these various groups. Mr. Bankman-Fried was arrested in
> the Bahamas December 12, 2022. Perhaps he had criminal defense counsel
> a month earlier who warned about the hazards of spoliation?
I never know how seriously to take encrypted or covert discussion lists
doing high-profile things with many participants where it's assumed,
more or less, that none of the participants is also an attacker.
I recall a protest of a local rapid-transit company that was organized
on signal, and when the protesters got to the place they discovered the
police and company security already set up and waiting for them. They
felt so betrayed. They were distraught, asking, "How did they know?!
Did we get hacked? How did they get the messages from our encrypted
private group?" And nobody seemed to have even considered that these
organizations actually employ people for exactly the purpose of
participating in such "private" online protest groups and notifying them
of upcoming events. Nobody has to be hacked if the group is organizing
or recruiting members, or advertising its actions in public. Take it as
read that if a thousand protesters know where to show up with their
signs, then any alert police force also knows where they're going to
show up with their signs. No encryption needs to be penetrated if some
of the participants, who get their keys exactly the same way the other
participants do, are working for the opposition.
Channels known to the attacker have a very high probability of being
compromised, because the attacker sees traffic and is motivated to place
someone into the network so they can get keys to read it.
In this case it appears that some participants in those discussions have
already turned over the records of the signal conversations to the
investigators. Recalling that at this point Bankman-Fried, FTX,
Ellison, and Alameda Research had already been under SEC investigation
for a couple of years, that is no surprise. They'd had plenty of time
to get close and insert eavesdroppers into the groups. And even if they
hadn't, as has already been pointed out Ellison and a couple of other
people have already made a plea bargain and started cooperating with the
investigation.
At the risk of bringing up another controversy consider the recent
counterexample in the Gaza strip: Hamas knew that Israel was running the
phone service and eavesdropping on all the phone and Internet traffic
both wired and wireless, and had the SOP of inserting spies to get
access to whatever was encrypted. They established unmonitored channels
by running their own telephone and TCP/IP network through their existing
underground tunnels under Gaza. Israel was confident that nothing was
happening because they hadn't heard a breath of it over the telephone
networks and internet which they ran and assiduously monitored, and they
were confident that nothing unknown was going on because they didn't see
significant encrypted traffic on their known and monitored channels that
they couldn't account for. And in this case Israel got blindsided by a
sneak attack that apparently took years to plan.
Well-known public channels like phone lines and the Internet are run, in
most cases, by people who have financial motives or legal mandates to
cooperate with eavesdroppers. Encrypted or not, any kind of group
communications over most of them are effectively public because the
traffic is visible and the eavesdroppers can get keys to read it by
pretending to be participants. This isn't a problem that can be solved
with encryption. This is an organizational security problem that was
real even when 'authentication' was handled by personally recognizing
the speaker by face and voice.
Bear
More information about the cryptography
mailing list