[51CTO.com Quick Translation] Is the messaging platform really as solid as a rock? Ordinary users may naively believe that popular social chat tools such as WhatsApp and Signal must be very thorough in encrypting messages and perfect in controlling business communication and privacy. However, the opposite is true. Due to the complexity of encrypted communications and the real-time concurrency of instant messaging, major enterprise-level messaging application platforms may make massive messages more easily leaked and more vulnerable to hacker attacks. To be fair, apps like WhatsApp and Signal have enabled advanced encryption technologies such as H-256, and can destroy messages stored on the platform after a period of retention according to the agreement between the user and the app. However, as the saying goes, "the higher the virtue, the higher the evil", hackers' technology is also improving day by day and constantly iterating. Therefore, the risk of real-time messages being intercepted, read, or even tampered with always exists.
End-to-end encryption (E2EE) protects you In order to protect the confidentiality of messages and the privacy of content, platforms often use end-to-end encryption technology during the transmission of messages. Its basic principle is: after the message is sent from the server, the end-to-end encryption method will convert the message or streaming media into untraceable data blocks, which is what we usually call "ciphertext". The ciphertext message is transmitted along the communication channel until it reaches the receiving end and is decrypted. In this way, we protect the data information in the message from unauthorized access or snooping. For convenience, you can think of end-to-end encryption as a "bodyguard". He picks you up from your home, helps you put on a mask, accompanies you on various means of transportation, and finally walks with you to the entrance of your destination. The following figure shows how the entire end-to-end encryption flows and is implemented within a messaging platform. An enterprise-grade messaging platform needs more than end-to-end encryption In a recent FBI investigation, they found that FBI agents were able to easily tap into chats and access messages sent by former Senate Intelligence Committee aide James Wolfe on the Signal platform from an encrypted server. Some of the content of these encrypted messages was even disclosed to the New York Times. It is still unknown how the FBI found the backdoor to crack the password and how they gained the trust of the encrypted messaging platform (some analysts believe that they used software technologies such as Pegasus). But it is worth noting that there are some underestimated protocols and operating systems in the current technology world, such as OMEMO and RattleSnake OS. They are designed for secure messaging scenarios across multiple devices. In the current market, companies like MirrorFly can provide the above encryption protocols and operating systems for messaging applications. As shown in the figure below, OMEMO is a protocol that uses the Double Ratchet algorithm to provide encryption services to multiple clients (endpoints). The basic functions of the OMEMO protocol include:
How the Double Ratchet Algorithm Works As shown in the figure below, when we use the AES-256 algorithm to encrypt messages, although the algorithm itself is unbreakable, the most difficult part is: how to let multiple recipients share the key over an insecure channel. In a one-to-one communication scenario, the Double Ratchet algorithm is processed by the Diffie Hellman (DH) key exchange. The Double Ratchet algorithm is an ideal method for performing multiple Diffie Hellman key exchanges simultaneously. Therefore, the entire communication is achieved by running two Ratchet algorithms in parallel, namely:
The RattleSnake OS mentioned above is mainly used in defensive communication scenarios. It uses cross-platform tools and AWS infrastructure to build its own operating system. Advantages of RattleSnake OS in Messaging Platform
Summarize In summary, when choosing instant messaging tools, especially enterprise-level messaging platforms, we should not blindly follow the trend, which will expose users to unknown risks and threats from advanced attackers. We should fully control our messaging applications and services by fully evaluating and adopting more secure encryption standards such as RattleSnake OS. End-to-End Encryption Isn't as Safe as You Think! [Translated by 51CTO. Please indicate the original translator and source as 51CTO.com when reprinting on partner sites] |
<<: WIFi 5 Final Madness 2019 Wireless Router Market Report
>>: Can 5G save operators from negative growth at the beginning of the year?
When it comes to connecting network devices acros...
"Carrier cloud" represented by China Te...
HostKvm is a foreign hosting service provider fou...
In our daily digital life, network connections ar...
In order to further unleash the role of new infra...
[[379162]] 1. Introduction to Transmission Contro...
For four consecutive years, the government work r...
I encountered some problems when working on HTTPS...
Today, data center managers are constantly battli...
In 2019, Samsung and Apple were the first to intr...
On December 22, according to foreign media report...
RAKsmart offers a series of promotional products ...
Redis is an open source, network-based, memory-ba...
LAN technology in computer networking is widely u...
VMISS (Virtual Machines Innovative Solutions) was...