Risk
8/13/2013
01:06 PM
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Silent Circle, Lavabit End Secure Email Services Due To Surveillance Concerns

Concerns about government surveillance could trigger mixed reactions among vendors in the market

The fallout from the controversy regarding the NSA's electronic surveillance programs has caused a firm providing encrypted email services to shutter its doors.

Silent Circle, which offers encryption services designed to shield everything from text messages to phone calls, says the decision to end its Silent Mail service reflects concerns regarding increased surveillance targeting users. With the move, it joins a company called Lavabit that suspended its operations last week, as well, due to concerns about government surveillance on the Internet.

The moves by the companies are the result of the ongoing ripples from the wave of controversy surrounding recent disclosures about NSA programs -- ripples that some predict could affect the secure messaging market in different ways.

"The thing to note about Silent Circle is that they are a niche cloud provider," says Paige Leidig, senior vice president at CipherCloud. "While they chose to shut down, the larger cloud provider titans, including likes Google and Microsoft, have a history of transparency reports that indicate they do not blindly comply with information requests. They also have the resources to mount a legal challenge which may not be an option for much smaller companies."

In a statement, Silent Circle chief technology officer Jon Callas said that Silent Mail was introduced because email was "fundamentally broken from a privacy perspective."

Silent Circle continues to offer other services that encrypt text messages and VoIP communications. The company says it does not log any metadata associated with these services and does not have the ability to decipher the content of calls and messages.

"With further thought -- and before we were served with any demands compounding this issue -- we decided it is in our users’ best interests to focus purely on peer-to-peer encrypted phone, text and videoconferencing services because the less information we have on how subscribers use our services, the better it is for everyone," Callas says.

"This is an unfortunate example of the chilling effect the current surveillance environment is having on innovative communications companies," he added. "While the majority of our government, commercial and consumer subscribers primarily use the unaffected apps that run on our peer-to-peer encrypted architecture -- like Silent Phone and Silent Text -- we apologize for any inconvenience this decision caused."

In a blog post, Lavabit owner Ladar Levison lamented being unable to share the exact circumstances that prompted his decision, but wrote that the decision was made after considerable "soul searching."

"This experience has taught me one very important lesson: without congressional action or a strong judicial precedent, I would _strongly_ recommend against anyone trusting their private data to a company with physical ties to the United States," he wrote.

Elsewhere in the industry, offered mixed predictions about how the mood of Web users and organizations will impact both the security market and trust on the Internet.

"The industry is full of visionaries and entrepreneurs who find inspiration in the marketplace to make the next generation of tools that businesses and consumers desire," Leidig said. "Judging from the significant jump in our prospect inquiries, many companies using cloud applications were rattled by the extent of the surveillance programs."

Steven Sprague, CEO of Wave Systems, says that instead of dropping services, a new market may open for protecting private communications on semi-public networks by using key servers located in different countries. This will ensure that government access to keys is dependent on the sovereign control of the country where the key server is, he explains.

"The challenge will be to establish the rules and notifications around these keys," he says. "I would also suggest that the challenge is to separate the messages and the keys requiring the companies to cooperate with the government access. Access is important for law enforcement, but voyeurism is not a good plan."

"It is time to focus on enhancing private communications," he continues. "The difference is: Where are the keys? If there is a central key service in the Netherlands, then content protected with those keys can only be viewed if access is granted from the Netherlands."

It is important that there is separation between content and keys so a single enterprise does not have the ability to read communications without the customer's knowledge, says Sprague.

Trust has already been lost to marketing on the Web, he adds.

"Everyone knows that Google and Apple are reading everything. [But] there is an opportunity for companies to promote protected content," he says.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Brian Prince is a freelance writer for a number of IT security-focused publications. Prior to becoming a freelance reporter, he worked at eWEEK for five years covering not only security, but also a variety of other subjects in the tech industry. Before that, he worked as a ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
MattL079
50%
50%
MattL079,
User Rank: Apprentice
9/9/2013 | 3:26:08 PM
re: Silent Circle, Lavabit End Secure Email Services Due To Surveillance Concerns
Ok, start to use a real secure email service like: https://www.mail1click.com/

Is quite famous and their servers (encrypted) aren't located in USA.
skswave
50%
50%
skswave,
User Rank: Apprentice
8/13/2013 | 8:57:02 PM
re: Silent Circle, Lavabit End Secure Email Services Due To Surveillance Concerns
It is time to explore and try new models We have put our money where our mouth is and built a service is is free so give it a try. scrambls.com if you open an account you can post on linked in and face book and many other sites encrypted it does not work on dark reading yet. By bracketing text in the @@ symbol everything betweeen is encrypted The key server for a message is in the US and subject to the patriot act and discovery but we are working to build partnerships to license key servers for which Wave will have absolutely no operational role so that discovery will be subject to local laws. scrambls also has strong developer tools at developer.wave.com leveraging @@
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2391
Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

CVE-2014-2392
Published: 2014-04-24
The E-Mail autoconfiguration feature in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 places a password in a GET request, which allows remote attackers to obtain sensitive information by reading (1) web-server access logs, (2) web-server Referer log...

CVE-2014-2393
Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in Open-Xchange AppSuite 7.4.1 before 7.4.1-rev11 and 7.4.2 before 7.4.2-rev13 allows remote attackers to inject arbitrary web script or HTML via a Drive filename that is not properly handled during use of the composer to add an e-mail attachment.

CVE-2011-5279
Published: 2014-04-23
CRLF injection vulnerability in the CGI implementation in Microsoft Internet Information Services (IIS) 4.x and 5.x on Windows NT and Windows 2000 allows remote attackers to modify arbitrary uppercase environment variables via a \n (newline) character in an HTTP header.

CVE-2012-0360
Published: 2014-04-23
Memory leak in Cisco IOS before 15.1(1)SY, when IKEv2 debugging is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCtn22376.

Best of the Web