Readit News logoReadit News
Zak · 10 months ago
> The Serbian criminals shared photos of their victims on Sky without realizing police had installed a probe on the Sky ECC servers in France, which allowed authorities to intercept and read every user’s messages.

I'm surprised criminals keep picking these niche messaging services, which keep turning out not to use proper end to end encryption, rather than Signal.

dghlsakjg · 10 months ago
Presumably you don’t hear about the ones that use signal for a reason…
notachatbot123 · 10 months ago
That's what a Fed would say to discourage Signal use.
red_admiral · 10 months ago
I believe I once read that back in the day, Al-Qaeda decided that AES and the like was probably compromised because it was made by the infidels, and launched their own "Islamic secure messenger" with an encryption algorithm their people had designed themselves.

This is not only terrible from a "let's get the list of all accounts who downloaded this app and perhaps track their phones" perspective, but also the encryption turned out to be exactly as good as you might have guessed.

TravisPeacock · 10 months ago
Just a fun aside: Islam is responsible for the foundations of algebra and the al in algorithm is of the same Arabic root.

I'm not an Imam but I feel like if someone wanted to justify using a Western created algorithm they could just say "well technically this is just built on our initial work"

or_am_i · 10 months ago
I guess the b2b sales work the same irrespective of the businesses' legal status.
jjmarr · 10 months ago
Criminals aren't immune to pitch decks and overspending on bespoke systems??
bjoli · 10 months ago
There was a Swedish case recently where a signal group of over 1000 people was infiltrated. (I think it was this one: https://sverigesradio.se/artikel/uppdrag-i-gruppchatt-morda-... - sound only. Sorry)

No e2e is going to help you if you invite the cops to your group chat I guess.

Zak · 10 months ago
Technical note: Signal does not support groups of over 1000 people; it supports exactly 1000. https://support.signal.org/hc/en-us/articles/360007319331-Gr...
loup-vaillant · 10 months ago
How any group of one thousand people could be truly safe? Of course they would get infiltrated. Groups who want to survive being hunted kinda have to either be smaller, or divide themselves into cells.
brudgers · 10 months ago
My guess is that the law enforcement hackers are professionals and use social engineering to encourage adoption of compromised apps.

Because social engineering is the foundation of hacking. Not technology.

dist-epoch · 10 months ago
Signal requires a telephone number.
RobotToaster · 10 months ago
You would think they would have their own tech people. I guess even crime isn't immune to outsourcing.
rolph · 10 months ago
i think these are the criminals that dont know the concept of local encyption vs encryption services, multiple serial encryptions, subjective "in" euphemisms, or other obfusication of clear payload

Dead Comment

Miraltar · 10 months ago
I guess you didn't really read the article so I'll put it here : > They intercepted one billion messages, but they couldn't read them at first because they were encrypted. It wasn’t until late 2020 that they managed to decrypt them.
kasey_junk · 10 months ago
The article is extremely vague on how they did this. The one big red flag though is that the protocol for the messenger in the article was a bespoke secret design by a single person who wasn't a cryptographer and not a well vetted public one.

I would love to see a technical analysis of the supposed end-to-end encryption methodology used here.

jpalawaga · 10 months ago
I have thoughts and feelings about a lot of this, but the part that stands out to me is LE folks intentionally working with agents out of their jurisdiction to circumvent the laws in their own jurisdiction.

You want to talk about unethical behaviour? That sounds borderline like a poison tree to me.

potato3732842 · 10 months ago
Follow the incentives.

The only practical check acting against the whims of these agencies is that if they do things that are too horrible the resulting public perception will be bad for the career advancement prospects of the top ranks who want to move into politics where optics matters.

morkalork · 10 months ago
Isn't that like half the raison d'être for the five eyes?
worldvoyageur · 10 months ago
"His father designed the data encryption algorithm.

“My dad's a genius,” said Eap. “It had the highest level of encryption available.”

Not only did Sky ECC provide end-to-end encryption, like Whatsapp or Signal, but unlike those free apps, it also redirected the data on its own secure network. "

This was the basis for users to think the system was secure? Seriously!?!

I'm reminded of the saying 'don't roll your own crypto'. Obviously the authorities were able to crack the crypto, probably at multiple points.

loup-vaillant · 10 months ago
> This was the basis for users to think the system was secure? Seriously!?!

Charisma and similar flavours of "trust me bro" works more than reasonable people would anticipate. See every pseudo science and conspiracy theory ever. Cryptography is no exception.

paxys · 10 months ago
Pretty ironic that they got caught after going out of their way to buy secure phones and use secure messaging services when an off-the-shelf iPhone and Whatsapp/Signal/Telegram would have made them 100% untraceable.
cwmma · 10 months ago
One of the features the phones had was that they could be remotely deleted and were locked down to prevent other apps on them. So an off the shelf iphone with signal is going to be vulnerable to having the device itself hacked via text message, bluetooth, or something else in a way the Sky ECC phones theoretically can't be, so it's not necessarily a slam dunk.
paxys · 10 months ago
- Buy a cheap android phone from a no-name Chinese OEM.

- Run a basic script to disable app installs, phone calls and some other features.

- Never update the OS. Don't do any security patching.

- Write your own encrypted messaging app with your own crypto. Don't get any external reviews or audits.

- Resell this as a Sky ECC phone with some marketing dollars labeling it as "secure" and "private".

What do you think is more hackable, this or a regular iPhone/Samsung Galaxy/Pixel?

asveikau · 10 months ago
These are common requirements for a corporate phone.

Remote wipe is provided by both Android and iPhone iirc even to end users.

A stock android phone, a knowledgeable user could already remove a bunch of stock apps.

mhitza · 10 months ago
Probably Signal would have been a safe bet. Telegram doesn't do encryption by default (on group messages? Been a year or two since I've used it). And Facebook complies with law enforcement agencies, and I don't think it's unreasonable for them to have a feature flags to selectively and transparently disable encryption for some participants if need be.
Zak · 10 months ago
Telegram doesn't do encryption on group messages at all, nor does it do encryption by default on any messages.

End to end encryption is available for one-to-one conversations, but must be turned on manually.

joering2 · 10 months ago
Facebook certainly likes to at least have sense to know what you are conversating about. Sometime in 2016 we and my buddy abroad got our accounts frozen "due to security reasons" at exact same time; what we were doing is having fun with FB Messenger and sending each other PGP-encrypted messages. This least about 2 months and my buddy is Egyptian, so I am pretty sure at some point FB said "we don't know what they chat about and enough is enough". I got my account recovered after multiple layers of verification including video-call to hold up my ID done by third-party ... my friend never gotten his reinstated.
loceng · 10 months ago
I suppose the hope is that if relatively good people, maybe bad actors but with certain limits, if they get exposed to or inadvertently the "opportunity" to be involved in higher orders of magnitude of bad - that they may then act as a light that helps create cracks in the armour to expose such horrific behaviour?
dist-epoch · 10 months ago
Reminds me of an organization buying pagers since they are more "secure".
anthk · 10 months ago
Or just a damn netbook (i386, Atom, pre-IntelME) with Email and GPG.
Scoundreller · 10 months ago
The average journo would struggle with that
paxys · 10 months ago
Hard to carry that around in your pocket when on a job.
ipython · 10 months ago
If you enjoy this story, read the book Dark Wire which focuses on the FBI’s infiltration of Anom, another encrypted message service. It also covers sky briefly. Fascinating story

https://www.hachettebookgroup.com/titles/joseph-cox/dark-wir...

morbicer · 10 months ago
Or if you prefer podcast, listen to this episode of Darknet Diaries

https://darknetdiaries.com/transcript/146/

Truly fascinating story

zuhsetaqi · 10 months ago
Or if you prefer video, watch this DEF CON 32 presentation

https://www.youtube.com/watch?v=uFyk5UOyNqI

darknavi · 10 months ago
A good defcon talk that referenced Sky but focused on another platform called Anon:

https://youtu.be/uFyk5UOyNqI?si=i-GtpeCR1QEj69cz

lyu07282 · 10 months ago
> In 2011, Eap started developing an encrypted messaging system with the help of his father, who holds a master’s degree in computer science from Simon Fraser University in Burnaby, B.C. The app was initially designed for BlackBerry phones and later made available for iPhones.

> His father designed the data encryption algorithm.

> “My dad's a genius,” said Eap. “It had the highest level of encryption available.”

It's hard to imagine that this level of ignorance wasn't intentional from the beginning.

loup-vaillant · 10 months ago
This quote sure was a huge red flag to me.

"My dad's a genius" because you're not supposed to rely on genius to make a good crypto system, and also because it makes Eap sounds like he has absolutely zero knowledge on the subject.

"highest level of encryption available" because there's a fairly low floor above which it's all uncrackable anyway (ChaCha20 + BLAKE2B authenticated encryption, and Curve448 + post quantum winners for the public stuff, should go beyond total overkill).

I don't believe it was intentional though. I'm just out of a quick job implementing SSCPv2 (encryption over RS485 to secure communication between card readers and central computer, typically used to secure buildings). Good specs, fairly good separation between cryptography and business logic, and as far as I could tell the crypto isn't broken… but it is quite old school: AES CBC + HMAC SHA256, using MAC then encrypt. https://moxie.org/2011/12/13/the-cryptographic-doom-principl... And while I think my implementation is okay, I did have to pay special attention to specific traps raising from this design, and to be honest wouldn't bet my life on having ironed out all possible timing attacks.

SSCPv2 was almost certainly designed after 2020, but it took books from 2005. Good books for their time, but a bit dated unfortunately. I'm pretty sure no actual cryptographer was involved. If there were, they would almost certainly have used standard authenticated encryption scheme like AES CGM, or ChaPoly (RFC 8439), they would have authenticated the unencrypted header, and provided an even better separation between crypto and business logic.

AnimalMuppet · 10 months ago
Sounds more like weapons-grade arrogance on the part of the dad, and the kid believed it.
dist-epoch · 10 months ago
Except these kinds of secure apps are never broken by attacking the encryption, but by just infiltrating/seizing the servers.
loup-vaillant · 10 months ago
For this one however this seems to be the case? The wording of the article isn't crystal clear, but it looks like the cops took control of the servers, and decrypted messages from there. So either the messages weren't truly end-to-end encrypted, or the encryption truly was broken.
avodonosov · 10 months ago
> Not only did Sky ECC provide end-to-end encryption, like Whatsapp or Signal, but unlike those free apps, it also redirected the data on its own secure network.

So how the messages were intercepted if e2e encryption is used?

garrettjoecox · 10 months ago
I’ve seen it before—a SaaS claiming to offer end-to-end encryption simply because it uses HTTPS/SSL for communication between the client and server. It’s laughable, but the lack of clear regulations or standards defining E2E encryption lets them get away with treating the client and server as the “ends.”

Not sure if that’s what happened here but it wouldn’t surprise me.

avodonosov · 10 months ago
I understand that's one of possibilities. But what actually happened in this case?
dist-epoch · 10 months ago
Backdoor the app itself and add an extra key?
avodonosov · 10 months ago
That's one of possibilities. But what actually happened in this case?