Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


01:06 PM

Silent Circle, Lavabit End Secure Email Services Due To Surveillance Concerns

Concerns about government surveillance could trigger mixed reactions among vendors in the market

The fallout from the controversy regarding the NSA's electronic surveillance programs has caused a firm providing encrypted email services to shutter its doors.

Silent Circle, which offers encryption services designed to shield everything from text messages to phone calls, says the decision to end its Silent Mail service reflects concerns regarding increased surveillance targeting users. With the move, it joins a company called Lavabit that suspended its operations last week, as well, due to concerns about government surveillance on the Internet.

The moves by the companies are the result of the ongoing ripples from the wave of controversy surrounding recent disclosures about NSA programs -- ripples that some predict could affect the secure messaging market in different ways.

"The thing to note about Silent Circle is that they are a niche cloud provider," says Paige Leidig, senior vice president at CipherCloud. "While they chose to shut down, the larger cloud provider titans, including likes Google and Microsoft, have a history of transparency reports that indicate they do not blindly comply with information requests. They also have the resources to mount a legal challenge which may not be an option for much smaller companies."

In a statement, Silent Circle chief technology officer Jon Callas said that Silent Mail was introduced because email was "fundamentally broken from a privacy perspective."

Silent Circle continues to offer other services that encrypt text messages and VoIP communications. The company says it does not log any metadata associated with these services and does not have the ability to decipher the content of calls and messages.

"With further thought -- and before we were served with any demands compounding this issue -- we decided it is in our users’ best interests to focus purely on peer-to-peer encrypted phone, text and videoconferencing services because the less information we have on how subscribers use our services, the better it is for everyone," Callas says.

"This is an unfortunate example of the chilling effect the current surveillance environment is having on innovative communications companies," he added. "While the majority of our government, commercial and consumer subscribers primarily use the unaffected apps that run on our peer-to-peer encrypted architecture -- like Silent Phone and Silent Text -- we apologize for any inconvenience this decision caused."

In a blog post, Lavabit owner Ladar Levison lamented being unable to share the exact circumstances that prompted his decision, but wrote that the decision was made after considerable "soul searching."

"This experience has taught me one very important lesson: without congressional action or a strong judicial precedent, I would _strongly_ recommend against anyone trusting their private data to a company with physical ties to the United States," he wrote.

Elsewhere in the industry, offered mixed predictions about how the mood of Web users and organizations will impact both the security market and trust on the Internet.

"The industry is full of visionaries and entrepreneurs who find inspiration in the marketplace to make the next generation of tools that businesses and consumers desire," Leidig said. "Judging from the significant jump in our prospect inquiries, many companies using cloud applications were rattled by the extent of the surveillance programs."

Steven Sprague, CEO of Wave Systems, says that instead of dropping services, a new market may open for protecting private communications on semi-public networks by using key servers located in different countries. This will ensure that government access to keys is dependent on the sovereign control of the country where the key server is, he explains.

"The challenge will be to establish the rules and notifications around these keys," he says. "I would also suggest that the challenge is to separate the messages and the keys requiring the companies to cooperate with the government access. Access is important for law enforcement, but voyeurism is not a good plan."

"It is time to focus on enhancing private communications," he continues. "The difference is: Where are the keys? If there is a central key service in the Netherlands, then content protected with those keys can only be viewed if access is granted from the Netherlands."

It is important that there is separation between content and keys so a single enterprise does not have the ability to read communications without the customer's knowledge, says Sprague.

Trust has already been lost to marketing on the Web, he adds.

"Everyone knows that Google and Apple are reading everything. [But] there is an opportunity for companies to promote protected content," he says.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Brian Prince is a freelance writer for a number of IT security-focused publications. Prior to becoming a freelance reporter, he worked at eWEEK for five years covering not only security, but also a variety of other subjects in the tech industry. Before that, he worked as a ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Apprentice
9/9/2013 | 3:26:08 PM
re: Silent Circle, Lavabit End Secure Email Services Due To Surveillance Concerns
Ok, start to use a real secure email service like: https://www.mail1click.com/

Is quite famous and their servers (encrypted) aren't located in USA.
User Rank: Apprentice
8/13/2013 | 8:57:02 PM
re: Silent Circle, Lavabit End Secure Email Services Due To Surveillance Concerns
It is time to explore and try new models We have put our money where our mouth is and built a service is is free so give it a try. scrambls.com if you open an account you can post on linked in and face book and many other sites encrypted it does not work on dark reading yet. By bracketing text in the @@ symbol everything betweeen is encrypted The key server for a message is in the US and subject to the patriot act and discovery but we are working to build partnerships to license key servers for which Wave will have absolutely no operational role so that discovery will be subject to local laws. scrambls also has strong developer tools at developer.wave.com leveraging @@
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-11
An issue was discovered in libezxml.a in ezXML 0.8.6. The function ezxml_internal_dtd(), while parsing a crafted XML file, performs incorrect memory handling, leading to a NULL pointer dereference while running strcmp() on a NULL pointer.
PUBLISHED: 2021-04-10
Valve Steam through 2021-04-10, when a Source engine game is installed, allows remote authenticated users to execute arbitrary code because of a buffer overflow that occurs for a Steam invite after one click.
PUBLISHED: 2021-04-10
A command execution vulnerability in SonicWall GMS 9.3 allows a remote unauthenticated attacker to locally escalate privilege to root.
PUBLISHED: 2021-04-09
Zoom Chat through 2021-04-09 on Windows and macOS allows certain remote authenticated attackers to execute arbitrary code without user interaction. An attacker must be within the same organization, or an external party who has been accepted as a contact. NOTE: this is specific to the Zoom Chat softw...
PUBLISHED: 2021-04-09
Use after free in screen sharing in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.