{"id":46050,"date":"2024-12-05T16:09:06","date_gmt":"2024-12-05T21:09:06","guid":{"rendered":"https:\/\/mjtsai.com\/blog\/?p=46050"},"modified":"2025-02-21T16:33:50","modified_gmt":"2025-02-21T21:33:50","slug":"us-officials-recommend-encrypted-apps","status":"publish","type":"post","link":"https:\/\/mjtsai.com\/blog\/2024\/12\/05\/us-officials-recommend-encrypted-apps\/","title":{"rendered":"US Officials Recommend Encrypted Messaging Apps"},"content":{"rendered":"<p><a href=\"https:\/\/www.nbcnews.com\/tech\/security\/us-officials-urge-americans-use-encrypted-apps-cyberattack-rcna182694\">Kevin Collier<\/a>:<\/p>\n<blockquote cite=\"https:\/\/www.nbcnews.com\/tech\/security\/us-officials-urge-americans-use-encrypted-apps-cyberattack-rcna182694\">\n<p>The hacking campaign, nicknamed Salt Typhoon by Microsoft, is one of the largest intelligence compromises in U.S. history, and it has not yet been fully remediated. Officials on a news call Tuesday refused to set a timetable for declaring the country&rsquo;s telecommunications systems free of interlopers.<\/p>\n<p>[&#8230;]<\/p>\n<p>In the call Tuesday, two officials &mdash; a senior FBI official who asked not to be named and Jeff Greene, executive assistant director for cybersecurity at the Cybersecurity and Infrastructure Security Agency &mdash; both recommended using encrypted messaging apps to Americans who want to minimize the chances of China&rsquo;s intercepting their communications.<\/p>\n<\/blockquote>\n\n<p>Via <a href=\"https:\/\/daringfireball.net\/linked\/2024\/12\/04\/us-official-urge-use-of-e2ee\">John Gruber<\/a>:<\/p>\n<blockquote cite=\"https:\/\/daringfireball.net\/linked\/2024\/12\/04\/us-official-urge-use-of-e2ee\">\n<p>It seems kind of new for the FBI to call encryption &ldquo;our friend&rdquo;, but now that I think about it, their beef over the years has primarily been about gaining access to locked devices, not eavesdropping on communication protocols. Their advocacy stance on device encryption has not changed&#x2009;&mdash;&#x2009;they still want a &ldquo;back door for good guys&rdquo; there. Their thinking, I think, is that E2EE communications are a good thing because they protect against remote eavesdropping from foreign adversaries&#x2009;&mdash;&#x2009;exactly like this campaign waged by China. The FBI doesn&rsquo;t need to intercept communications over the wire. When the FBI wants to see someone&rsquo;s communications, they get a warrant to seize their devices. That&rsquo;s why the FBI <a href=\"https:\/\/www.fbi.gov\/about\/mission\/lawful-access\">wants device back doors<\/a>, but are now encouraging the use of protocols that are truly E2EE. But that&rsquo;s not to say that law enforcement agencies worldwide <a href=\"https:\/\/www.bbc.com\/news\/technology-66716502\">don&rsquo;t still fantasize about mandatory &ldquo;back doors for good guys&rdquo;<\/a>.<\/p>\n<\/blockquote>\n\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/12\/americans-urged-to-use-encrypted-messaging-after-large-ongoing-cyberattack\">Pieter Arntz<\/a>:<\/p>\n<blockquote cite=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/12\/americans-urged-to-use-encrypted-messaging-after-large-ongoing-cyberattack\">\n<p>Sophisticated state-sponsored campaigns from China are constantly targeting network appliances and devices. Among the culprits are four major APT groups: Volt Typhoon, Salt Typhoon, Flax Typhoon, and Velvet Ant. Volt Typhoon made headlines earlier this year when the <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/02\/fbi-removes-malware-from-hundreds-of-routers-across-the-us\">FBI removed their malware from hundreds of routers<\/a> across the US.<\/p>\n<p>The infrastructure that the US government relies to communicate on is made up of the same private sector systems that everybody else uses. By abusing their components that make up part of the infrastructure, the Chinese are said to have been able to eavesdrop on political and industrial leaders in multiple countries.<\/p>\n<\/blockquote>\n\n<p><a href=\"https:\/\/daringfireball.net\/linked\/2024\/12\/04\/shame-on-google-messages\">John Gruber<\/a>:<\/p>\n<blockquote cite=\"https:\/\/daringfireball.net\/linked\/2024\/12\/04\/shame-on-google-messages\">\n<p>While writing <a href=\"https:\/\/daringfireball.net\/linked\/2024\/12\/04\/us-official-urge-use-of-e2ee\">the previous item<\/a> regarding the FBI encouraging the use of E2EE text and call protocols, I wound up at the Play Store page for Google Messages. It&rsquo;s shamefully misleading regarding Google Messages&rsquo;s support for end-to-end encryption. As I wrote in the previous post, Google Messages does support E2EE, but only over RCS and only if all participants in the chat are using a recent version of Google Messages. But <a href=\"https:\/\/daringfireball.net\/misc\/2024\/12\/google-messages-play-store-e2ee.png\">the second screenshot in the Play Store listing<\/a> flatly declares &ldquo;Conversations are end-to-end encrypted&rdquo;, full stop. That is some serious bullshit.<\/p>\n<\/blockquote>\n<p>I don&rsquo;t see what the big deal is when the third sentence of the description says: &ldquo;End-to-end encryption is on by default when you message other Google Messages users who have RCS enabled.&rdquo;<\/p>\n\n<p>Apple marketed iMessage as end-to-end encrypted for years, even though it really wasn&rsquo;t if you had iCloud backup enabled. And it still isn&rsquo;t, by default&mdash;you have to opt into Advanced Data Protection. Neither the <a href=\"https:\/\/apps.apple.com\/us\/app\/messages\/id1146560473\">App Store<\/a> nor the <a href=\"https:\/\/www.apple.com\/legal\/privacy\/data\/en\/messages\/\">Messages &amp; Privacy<\/a> page mentions this.<\/p>\n\n<p><a href=\"https:\/\/www.techdirt.com\/2024\/12\/04\/federal-court-says-dismantling-a-phone-to-install-firmware-isnt-a-search-even-if-was-done-to-facilitate-a-search\/\">Tim Cushing<\/a> (<a href=\"https:\/\/news.ycombinator.com\/item?id=42329005\">Hacker News<\/a>):<\/p>\n<blockquote cite=\"https:\/\/www.techdirt.com\/2024\/12\/04\/federal-court-says-dismantling-a-phone-to-install-firmware-isnt-a-search-even-if-was-done-to-facilitate-a-search\/\">\n<blockquote cite=\"https:\/\/www.techdirt.com\/2024\/12\/04\/federal-court-says-dismantling-a-phone-to-install-firmware-isnt-a-search-even-if-was-done-to-facilitate-a-search\/\"><p>The Government executed a search warrant at Defendant&rsquo;s residence and seized fifty-two devices, including an iPhone and an iPad. Law enforcement identified contraband on several devices, but could not examine the iPad, which was passcode-protected, or the iPhone, which would not power on.<\/p><p>The Government retained the iPad and iPhone for over a year.\nEventually, with the assistance of a digital forensics expert who had not previously been involved in the investigation, the Government was able to repair the iPhone and power it on. The Government then applied for, and received, a new search warrant. Pursuant to this authority, agents searched the iPhone and&mdash;thanks to intervening developments in digital forensics tools&mdash;the iPad.<\/p><\/blockquote>\n<p>The most logical assumption would be that a non-working device would be of limited evidentiary value. But the DHS (whose Homeland Security Investigations unit took point in this case) apparently felt otherwise.<\/p><p>What&rsquo;s almost hidden here is that reviving the phone led to the government being able to crack it, despite the presence of a passcode. And, in case you&rsquo;re still wondering about the value of walled gardens, cracking the iPhone immediately led to cracking the iPad, which suggests if the government has one Apple device owned by a suspect it can get into, it can probably get into the rest of their Apple devices.<\/p><p>[&#8230;]<\/p><p>This is another government party extensively modifying seized property to make it more receptive to phone-cracking efforts. One would think a court would need to be apprised of this opportunity before it became a reality, if for no other reason than the original warrant only authorized a search, not the literal cracking of a cell phone (or its casing, at least) to replace a circuit board and install new firmware.<\/p><\/blockquote>\n<p>This was apparently an iPhone 6, however.<\/p>\n\n<p>Previously:<\/p>\n<ul>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2024\/10\/09\/china-possibly-hacking-us-lawful-access-backdoor\/\">China Possibly Hacking US &ldquo;Lawful Access&rdquo; Backdoor<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2024\/09\/18\/apple-drops-lawsuit-against-nso-group\/\">Apple Drops Lawsuit Against NSO Group<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2024\/08\/05\/apple-intelligence-privacy-dark-patterns\/\">Apple Intelligence Privacy Dark Patterns<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2024\/04\/11\/apple-alerts-users-to-mercenary-spyware-attacks\/\">Apple Alerts Users to Mercenary Spyware Attacks<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2023\/08\/24\/u-k-proposal-to-weaken-messaging-security\/\">UK Proposal to Weaken Messaging Security<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2022\/12\/07\/advanced-data-protection-for-icloud\/\">Advanced Data Protection for iCloud<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2022\/10\/17\/whatsapp-more-private-than-imessage\/\">WhatsApp More Private Than iMessage<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2021\/12\/23\/fbi-guide-to-getting-messaging-data\/\">FBI Guide to Getting Messaging Data<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2021\/06\/22\/google-messages-adds-end-to-end-encryption\/\">Google Messages Adds End-to-End Encryption<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2021\/01\/14\/reminder-imessage-not-meaningfully-e2e\/\">Reminder: iMessage Not Meaningfully E2E<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2019\/07\/24\/attorney-general-william-barr-on-encryption-policy\/\">Attorney General William Barr on Encryption Policy<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2016\/09\/29\/apples-imessage-metadata-logs\/\">Apple&rsquo;s iMessage Metadata Logs<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2016\/02\/17\/fbi-asks-apple-for-secure-golden-key\/\">FBI Asks Apple for Secure Golden Key<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2013\/06\/26\/can-apple-read-your-imessages\/\">Can Apple Read Your iMessages?<\/a><\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>Kevin Collier: The hacking campaign, nicknamed Salt Typhoon by Microsoft, is one of the largest intelligence compromises in U.S. history, and it has not yet been fully remediated. Officials on a news call Tuesday refused to set a timetable for declaring the country&rsquo;s telecommunications systems free of interlopers. [&#8230;] In the call Tuesday, two officials [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"apple_news_api_created_at":"2024-12-05T21:09:08Z","apple_news_api_id":"47447bbc-7c3f-4440-9d7e-e2c6d8687da4","apple_news_api_modified_at":"2024-12-06T14:15:20Z","apple_news_api_revision":"AAAAAAAAAAAAAAAAAAAAAw==","apple_news_api_share_url":"https:\/\/apple.news\/AR0R7vHw_RECdfuLG2Gh9pA","apple_news_coverimage":0,"apple_news_coverimage_caption":"","apple_news_is_hidden":false,"apple_news_is_paid":false,"apple_news_is_preview":false,"apple_news_is_sponsored":false,"apple_news_maturity_rating":"","apple_news_metadata":"\"\"","apple_news_pullquote":"","apple_news_pullquote_position":"","apple_news_slug":"","apple_news_sections":"\"\"","apple_news_suppress_video_url":false,"apple_news_use_image_component":false,"footnotes":""},"categories":[2],"tags":[1394,132,1547,2698,1347,2700,2729,140,355,2086,1672,86,1363],"class_list":["post-46050","post","type-post","status-publish","format-standard","hentry","category-technology","tag-att","tag-carrier","tag-china","tag-cybersecurity-and-infrastructure-security-agency-cisa","tag-federal-bureau-of-investigation-fbi","tag-google-messages","tag-icloud-advanced-data-protection","tag-imessage","tag-privacy","tag-rich-communication-services-rcs","tag-signal","tag-verizon","tag-whatsapp"],"apple_news_notices":[],"_links":{"self":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/46050","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/comments?post=46050"}],"version-history":[{"count":5,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/46050\/revisions"}],"predecessor-version":[{"id":46062,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/46050\/revisions\/46062"}],"wp:attachment":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/media?parent=46050"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/categories?post=46050"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/tags?post=46050"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}