Cryptocat Wins Apple Approval

  /     /     /  
Publicated : 22/11/2024   Category : security


Cryptocat Wins Apple Approval


NSA surveillance and other worldwide events drive interest in secure messaging, and iOS users now have a new option.



Privacy? Theres an app for that, and more are on their way.
Cryptocat
, an open-source app for encrypted online chat sessions, is now available for free through Apples iOS App Store, after initially being rejected several months ago.
The Electronic Frontier Foundation, through its Coders Rights Project, provided advice to Crypocats developers that helped convince Apple to change its mind about the app. EFF attorney Kurt Opsahl in an email declined to provide details about the privileged counsel it provided. However we are very pleased that Apple included the program in the App Store, he said.
Cryptocat is already available as a web app and an OS X app, and its mobile debut comes as ongoing revelations about the scope of NSA surveillance drive peoples desire for countermeasures and dreams of entrepreneurship.
[Make sure to protect all your personal data. See
LinkedIn Privacy: 5 Safety Tips
.]
Wickr
, which aspires to be a more secure version of Snapcat, on Monday said it had closed a deal for $9 million in venture funding. Silent Circle has just begun taking orders for its $629
Blackphone
, a privacy-focused smartphone that features a customized version of Android called PrivatOS and a suite of secure communications apps. Last week, Whisper Systems released
TextSecure
, a free private instant messaging app for Android. The company also makes the RedPhone app for secure calls. Other secure communications software includes
SafeSlinger
and
Off-the-Record Messaging
.
Its not just blowback from the NSA documents leaked by Edward Snowden. Its also timing: Among the recent
RSA Conference
, TrustyCon (organized as a protest to RSA), and RightsCon Silicon Valley, there are a lot of security and privacy events at this time of year.
Nadim Kobeissi, lead developer of Cryptocat, said in an email that past criticism of Cryptocat has been addressed. He emphasized that Cryptocat relies on open, transparent code reviews in conjunction with professional audits.
We published our codebase three months before the apps release, so that the code could be reviewed by independent enthusiasts and auditors, Kobeissi said. No product is perfect, but we take every step to make our methodology, protocols, and cryptographic research verifiable by anyone who cares to look, months before the software is out there.
The absence of perfect security was underscored on Tuesday by reports of a cryptography processing flaw in the open-source GnuTLS library that renders hundreds of open-source packages vulnerable. Ars Technica suggested
the bug may go back to 2005
.
A year ago, Matthew Green, a cryptographer and research professor at Johns Hopkins University, published a blog post that highlighted some of the
limits of encryption apps
, including Cryptocat. While he found things to admire in each of the apps, he didnt consider any of them secure enough to employ in fighting an oppressive regime. And given whats going on in Ukraine at the moment, thats not a hypothetical use-case.
The real issue is that they each run on a vulnerable, networked platform, Green wrote. If I really had to trust my life to a piece of software, I would probably use something much less flashy --
GnuPG
, maybe, running on an isolated computer locked in a basement. Then I would probably stay locked in the basement with it.
For truly secure electronic communication, it appears that the only way to win is not to play. Or did you think that a free app could thwart intelligence agencies with budgets in the billions and legal regimes that bend to accommodate their hunger for data? And if it did, torture tends to defeat even the strongest encryption. Risk comes with the territory.
Yet Green backs away from this depressing conclusion, noting that smartphones have already changed the way people interact with government and that encryption apps might just lead the way to truly private communication.
If that were ever to happen, if software flaws and government subversion of encryption standards were eliminated, wed soon have laws requiring a backdoor.
The NSA leak showed that one rogue insider can do massive damage. Use these three steps to keep your information safe from internal threats. Also in the
Stop Data Leaks
issue of Dark Reading: Technology is critical, but corporate culture also plays a central role in stopping a big breach. (Free registration required.)

Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Cryptocat Wins Apple Approval