09:45 AM
Connect Directly

Cryptocat Wins Apple Approval

NSA surveillance and other worldwide events drive interest in secure messaging, and iOS users now have a new option.

Privacy? There's an app for that, and more are on their way. Cryptocat, an open-source app for encrypted online chat sessions, is now available for free through Apple's iOS App Store, after initially being rejected several months ago.

The Electronic Frontier Foundation, through its Coders' Rights Project, provided advice to Crypocat's developers that helped convince Apple to change its mind about the app. EFF attorney Kurt Opsahl in an email declined to provide details about the privileged counsel it provided. "However we are very pleased that Apple included the program in the App Store," he said.

Cryptocat is already available as a web app and an OS X app, and its mobile debut comes as ongoing revelations about the scope of NSA surveillance drive people's desire for countermeasures and dreams of entrepreneurship.

[Make sure to protect all your personal data. See LinkedIn Privacy: 5 Safety Tips.]

Wickr, which aspires to be a more secure version of Snapcat, on Monday said it had closed a deal for $9 million in venture funding. Silent Circle has just begun taking orders for its $629 Blackphone, a privacy-focused smartphone that features a customized version of Android called PrivatOS and a suite of secure communications apps. Last week, Whisper Systems released TextSecure, a free private instant messaging app for Android. The company also makes the RedPhone app for secure calls. Other secure communications software includes SafeSlinger and Off-the-Record Messaging.

It's not just blowback from the NSA documents leaked by Edward Snowden. It's also timing: Among the recent RSA Conference, TrustyCon (organized as a protest to RSA), and RightsCon Silicon Valley, there are a lot of security and privacy events at this time of year.

Nadim Kobeissi, lead developer of Cryptocat, said in an email that past criticism of Cryptocat has been addressed. He emphasized that Cryptocat relies on open, transparent code reviews in conjunction with professional audits.

"We published our codebase three months before the app's release, so that the code could be reviewed by independent enthusiasts and auditors," Kobeissi said. "No product is perfect, but we take every step to make our methodology, protocols, and cryptographic research verifiable by anyone who cares to look, months before the software is out there."

The absence of perfect security was underscored on Tuesday by reports of a cryptography processing flaw in the open-source GnuTLS library that renders hundreds of open-source packages vulnerable. Ars Technica suggested the bug may go back to 2005.

A year ago, Matthew Green, a cryptographer and research professor at Johns Hopkins University, published a blog post that highlighted some of the limits of encryption apps, including Cryptocat. While he found things to admire in each of the apps, he didn't consider any of them secure enough to employ in fighting an oppressive regime. And given what's going on in Ukraine at the moment, that's not a hypothetical use-case.

"The real issue is that they each run on a vulnerable, networked platform," Green wrote. "If I really had to trust my life to a piece of software, I would probably use something much less flashy -- GnuPG, maybe, running on an isolated computer locked in a basement. Then I would probably stay locked in the basement with it."

For truly secure electronic communication, it appears that the only way to win is not to play. Or did you think that a free app could thwart intelligence agencies with budgets in the billions and legal regimes that bend to accommodate their hunger for data? And if it did, torture tends to defeat even the strongest encryption. Risk comes with the territory.

Yet Green backs away from this depressing conclusion, noting that smartphones have already changed the way people interact with government and that encryption apps might just lead the way to truly private communication.

If that were ever to happen, if software flaws and government subversion of encryption standards were eliminated, we'd soon have laws requiring a backdoor.

The NSA leak showed that one rogue insider can do massive damage. Use these three steps to keep your information safe from internal threats. Also in the Stop Data Leaks issue of Dark Reading: Technology is critical, but corporate culture also plays a central role in stopping a big breach. (Free registration required.)

Thomas Claburn has been writing about business and technology since 1996, for publications such as New Architect, PC Computing, InformationWeek, Salon, Wired, and Ziff Davis Smart Business. Before that, he worked in film and television, having earned a not particularly useful ... View Full Bio

Comment  | 
Print  | 
More Insights
Oldest First  |  Newest First  |  Threaded View
Li Tan
Li Tan,
User Rank: Apprentice
3/6/2014 | 12:17:25 AM
Good thing for Apple
This is a good thing for Apple - it can put in a plug for the new Cryptocat on iOS. The secure messaging and the also mobile security as a whole is a big concern from end user communities. The approval of Cryptocat will definitely help to boost the strength of iOS in this area.
Register for Dark Reading Newsletters
White Papers
Current Issue
Dark Reading Tech Digest September 7, 2015
Some security flaws go beyond simple app vulnerabilities. Have you checked for these?
Flash Poll
Containing Corporate Data on Mobile Devices
Containing Corporate Data on Mobile Devices
If you’re still focused on securing endpoints, you’ve got your work cut out for you. WiFi network provider iPass surveyed 1,600 mobile workers and found that the average US employee carries three devices -- a smartphone, a computer, and a tablet or e-reader -- with more than 80% of them doing work on personal devices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-09
Simple Streams (simplestreams) does not properly verify the GPG signatures of disk image files, which allows remote mirror servers to spoof disk images and have unspecified other impact via a 403 (aka Forbidden) response.

Published: 2015-10-09
The Telephony component in Apple OS X before 10.11, when the Continuity feature is enabled, allows local users to bypass intended telephone-call restrictions via unspecified vectors.

Published: 2015-10-09
IcedTea-Web before 1.5.3 and 1.6.x before 1.6.1 does not properly sanitize applet URLs, which allows remote attackers to inject applets into the .appletTrustSettings configuration file and bypass user approval to execute the applet via a crafted web page, possibly related to line breaks.

Published: 2015-10-09
IcedTea-Web before 1.5.3 and 1.6.x before 1.6.1 does not properly determine the origin of unsigned applets, which allows remote attackers to bypass the approval process or trick users into approving applet execution via a crafted web page.

Published: 2015-10-09
The Safari Extensions implementation in Apple Safari before 9 does not require user confirmation before replacing an installed extension, which has unspecified impact and attack vectors.

Dark Reading Radio
Archived Dark Reading Radio
What can the information security industry do to solve the IoT security problem? Learn more and join the conversation on the next episode of Dark Reading Radio.