👊🇺🇲🔥leaks

Author: WyIted

Posts

Total: 127
whiteflame
whiteflame's avatar
Debates: 27
Posts: 5,765
4
6
10
whiteflame's avatar
whiteflame
4
6
10
-->
@WyIted
You are essentially supposed to have 2 separate Operating systems on the phone. One for secure communication and one that's less locked down than normal. Now I can't imagine that big publications don't have cyber security professionals on stand by given that if they leak information from people in vulnerable locations. Such as whistleblowers in the Iranian government, it can literally cause their sources to be killed.
Again, assuming a lot about what these organizations have access to with their limited resources and how that stacks up against the resources of the federal government. What's optimal is not reality in this case. Even if that was true, though, this is all besides the point. The federal government shouldn't assume journalist's phones are this secure, and even if they did assume that, they shouldn't be making these journalists privy to information that they do not have the security clearances to receive.

WyIted
WyIted's avatar
Debates: 34
Posts: 7,636
3
4
9
WyIted's avatar
WyIted
3
4
9
-->
@whiteflame
I understand how you said it can be cracked. It's not signal being cracked so much as the users credentials. So I would agree that if you allow your credentials to get stolen you are vulnerable but there is no system that can prevent that. If your credentials get stolen you can capture the data with a Man in the middle attack and decrypt it anyway in a replay attack.
WyIted
WyIted's avatar
Debates: 34
Posts: 7,636
3
4
9
WyIted's avatar
WyIted
3
4
9
-->
@whiteflame
. The federal government shouldn't assume journalist's phones are this secure, and even if they did assume that, they shouldn't be making these journalists privy to information that they do not have the security clearances to receive.
I don't disagree I just don't want anyone discouraged from using signal because they think the feds can crack it.
whiteflame
whiteflame's avatar
Debates: 27
Posts: 5,765
4
6
10
whiteflame's avatar
whiteflame
4
6
10
-->
@WyIted
I understand how you said it can be cracked. It's not signal being cracked so much as the users credentials. So I would agree that if you allow your credentials to get stolen you are vulnerable but there is no system that can prevent that. If your credentials get stolen you can capture the data with a Man in the middle attack and decrypt it anyway in a replay attack.
That's an inherent part of how Signal works. That connection to other computers is the problem here, not the existence of credentials associated with the account.

whiteflame
whiteflame's avatar
Debates: 27
Posts: 5,765
4
6
10
whiteflame's avatar
whiteflame
4
6
10
-->
@WyIted
I don't disagree I just don't want anyone discouraged from using signal because they think the feds can crack it.
I think for this specific purpose, the use of Signal was a distinctly poor choice, that it should not be used as a vehicle for the delivery of classified military info. No one is arguing that Signal should never be used by anyone.

Greyparrot
Greyparrot's avatar
Debates: 4
Posts: 27,468
3
4
10
Greyparrot's avatar
Greyparrot
3
4
10
-->
@whiteflame
Were they trying to entrap Jeffrey Goldberg?
Unlikely, perhaps someone else?
WyIted
WyIted's avatar
Debates: 34
Posts: 7,636
3
4
9
WyIted's avatar
WyIted
3
4
9
-->
@whiteflame
They aren't explaining it well. It uses asymmetric encryption. That means one password for encrypting and a second for decrypting. You can only decrypt with the second password so if another computer captures the data they can't decrypt it without the credentials which includes the receivers password. If they have those credentials it may be undetectable, I have to check. I also need to check and see but I think signal uses temporary session keys as well which means they would have to intercept and decrypt in real time
whiteflame
whiteflame's avatar
Debates: 27
Posts: 5,765
4
6
10
whiteflame's avatar
whiteflame
4
6
10
-->
@Greyparrot
Unlikely, perhaps someone else?
Then I struggle to understand how this could be described as a "honeypot." Who was it trying to entrap and why would a journalist be dragged into it instead of keeping the operation quiet?

whiteflame
whiteflame's avatar
Debates: 27
Posts: 5,765
4
6
10
whiteflame's avatar
whiteflame
4
6
10
-->
@WyIted
They aren't explaining it well. It uses asymmetric encryption. That means one password for encrypting and a second for decrypting. You can only decrypt with the second password so if another computer captures the data they can't decrypt it without the credentials which includes the receivers password. If they have those credentials it may be undetectable, I have to check. I also need to check and see but I think signal uses temporary session keys as well which means they would have to intercept and decrypt in real time
Alright. Get back to me when you have more information because it doesn't sound like there's a difference between what I'm saying and what you're saying. I'm not arguing there aren't credentials involved.

WyIted
WyIted's avatar
Debates: 34
Posts: 7,636
3
4
9
WyIted's avatar
WyIted
3
4
9
-->
@Greyparrot
Unlikely, perhaps someone else?
If I had time I would look at close associates of waltz who also have the last name Goldberg and see if they were intended for the communication but he fucked up
WyIted
WyIted's avatar
Debates: 34
Posts: 7,636
3
4
9
WyIted's avatar
WyIted
3
4
9
-->
@whiteflame
All I am saying is that same weakness would be in any other medium they used. If they emailed it would have the same weakness. You can't really have the signals not appear publicly. Email also uses asymmetric encryption and session keys. It's the same exact weakness.

I could see limited use for secure lines of communication. Like actual hard lines that are untappavle but those wouldn't be available when you have multiple people communicating thousands of miles apart at the same time and messages are more secure than a phone call.
Double_R
Double_R's avatar
Debates: 3
Posts: 5,664
3
2
5
Double_R's avatar
Double_R
3
2
5
-->
@WyIted
A Jewish journalist
Why is his ethnicity/religion relevant here? Just curious.

decided to leak classified details of a chat he was accidentally included in. 
He removed any information from the thread that may have been classified before posting.

If I was in the chat I personally would have immediately informed them that they are sharing sensitive information with me but I guess Goldberg doesn't care or the leak was intentional just for funsies since nothing really incriminating was in the leaks. 
Well first of all, he's a journalist. It's literally his job to report something like this.

Moreover, I would argue the public interest is far greater in making it known how these officials were recklessly handling classified material.

Or the leaks are fake which is also possible.
They've already acknowledged this did in fact occurr.

Anyway the chat took place on signal which is secure and I am sure that high level politicians like this have their phones remote wiped and locked down in the event the phones are lost or stolen so the only security slip was including a journalist in the chat but it's not that insecure since the guy probably doesn't want to lose access by leaking the. Chat prior to the operation mentioned. 
Signal is secure relative to what it's intended for - an app anyone can download to protect their personal communications. It is not secure when held to the standards applicable for securing classified information.

The rush by the right to excuse this is pretty incredible. I recall hearing for years about how unfit Hillary Clinton was for using a private server and how she should have been in jail, yet the same people who made that charge are all the same people involved here. It's astonishing.

whiteflame
whiteflame's avatar
Debates: 27
Posts: 5,765
4
6
10
whiteflame's avatar
whiteflame
4
6
10
-->
@WyIted
All I am saying is that same weakness would be in any other medium they used. If they emailed it would have the same weakness. You can't really have the signals not appear publicly. Email also uses asymmetric encryption and session keys. It's the same exact weakness.

I could see limited use for secure lines of communication. Like actual hard lines that are untappavle but those wouldn't be available when you have multiple people communicating thousands of miles apart at the same time and messages are more secure than a phone call.
Except that's obviously not accurate. You don't have to share these programs between multiple devices like email, otherwise security experts across the country wouldn't be calling it out specifically for this problem. Again, I'm not knowledgeable about how these programs work, but if a lot of people who are in the know are decrying this for this specific flaw, then I assume that the existing communication methods include something that can get around it.
WyIted
WyIted's avatar
Debates: 34
Posts: 7,636
3
4
9
WyIted's avatar
WyIted
3
4
9
-->
@Double_R
Where are you getting I am being overly critical of the journalist. Yes the journalist should report on this. I had a minor criticism that he didn't expose his presence and let them know he was listening in. 

Signal is secure relative to what it's intended for - an app anyone can download to protect their personal communications. It is not secure when held to the standards applicable for securing classified information.
You are talking out of your ass here. I am studying cyber security and I am telling you that I made this same mistake before studying it. 

The layman thinks open source is less secure because anyone can look at the code. It feels intuitively correct. Anyone can literally look at flaws. However in real life particularly when it comes to an app as popular as signal then you have millions of pen testers able to find weaknesses and they are secured faster and more thoroughly. The governments advantage is not that they are better at securing data. They aren't any better than me. Their advantage is in offensive measures. Me and the CIA are on equal grounds when it comes to defensive measures. 


WyIted
WyIted's avatar
Debates: 34
Posts: 7,636
3
4
9
WyIted's avatar
WyIted
3
4
9
-->
@whiteflame
Email is more secure. I agree but Jesus it would be a lot more painful than a messaging app, especially when you can go to the signal settings and literally looked for linked devices and disconnect them which I would hope is routinely done for this level of communication
WyIted
WyIted's avatar
Debates: 34
Posts: 7,636
3
4
9
WyIted's avatar
WyIted
3
4
9
If I saw a linked devices on my signal account I would just get a new account tbh
Double_R
Double_R's avatar
Debates: 3
Posts: 5,664
3
2
5
Double_R's avatar
Double_R
3
2
5
-->
@WyIted
Yes the journalist should report on this. I had a minor criticism that he didn't expose his presence and let them know he was listening in. 
According to that journalist he paid no attention to the chat cause he thought it was fake. No way he was included on a chat with US cabinet officials planning a military strike. Then he saw the news that the US carried out the strike described in the chat. Hell of a way to find out what he was included in.

The layman thinks open source is less secure because anyone can look at the code. It feels intuitively correct. Anyone can literally look at flaws. However in real life particularly when it comes to an app as popular as signal then you have millions of pen testers able to find weaknesses and they are secured faster and more thoroughly.
Ok then. I have yet to hear any expert make that case but it's early so we'll see what gets revealed.
WyIted
WyIted's avatar
Debates: 34
Posts: 7,636
3
4
9
WyIted's avatar
WyIted
3
4
9
-->
@Double_R
Ryan Mcbeth is a cyber security expert who is pretty explicitly liberally biased. I am sure he will comment soon but has ignored it. I will be interested in what he has to say but I will say the mistake was in including the journalist not in using signal as stated officials have been explicitly told to use signal
Shila
Shila's avatar
Debates: 0
Posts: 6,910
3
3
5
Shila's avatar
Shila
3
3
5
Were they trying to entrap Jeffrey Goldberg?
Unlikely, perhaps someone else?

Does the military use the Signal app?
The encrypted chat app beloved by Elon Musk and foreign dissidents has been embraced by federal government workers, DOGE and military planners.

ADreamOfLiberty
ADreamOfLiberty's avatar
Debates: 0
Posts: 4,404
3
2
2
ADreamOfLiberty's avatar
ADreamOfLiberty
3
2
2
-->
@whiteflame
'People can link Signal messaging to a desktop application.' he said. 'This means that Signal data is being delivered to potentially multiple desktop and laptop computers where it isn’t being stored in a phone’s secure enclave. That data is then at risk from commodity malware on the system.'"
Previous statements were generalizations from people who clearly have no inside information.

This paragraph is detailed enough to make me doubt the expertise of the author.

"phone's secure enclave", the implication that a phone is more secure than a PC is naive. Maybe an iphone because of their rather wise policy of using full drive encryption without making users jump through too many hoops.

Otherwise nonsense, an off the shelf android phone from samsung has no automatic encryption around app storage or much else nor are phones generally immune from spyware anymore than PCs. In both cases spyware is either baked in (somebody tampered with the OS installation), or it was let in by the user.

Whether the OS encrypts the messages or not, the signal app certainly can. Does it?

It certainly can:

    await sql.initialize({
      appVersion: app.getVersion(),
      configDir: userDataPath,
      key,
      logger: getLogger(),
    });
You can look where they get the key from, it is a chromium user secret where possible.

This is the library they are using: https://www.electronjs.org/docs/latest/api/safe-storage

My ability to research this in five minutes is what gives me trust in it, the utter stupidity government contractors is what makes me doubt what they do.

In my experience what government workers do is they take something off the shelf, poke at it for a while, declare it acceptable (possibly with a bunch of bribes and 10 layers of useless clueless middlemen), and then force it onto government setup devices.

I wouldn't be surprised if the government's idea of a secure messaging system is a fork of Signal, I also wouldn't be surprised if its an ancient piece of shit program that still has COBOL in it, once having been perfect and efficient but now after being adapted to modern hardware environments 20 times has just as many "security vulnerabilities" as Signal with a hundred times the maintenance effort.

Since we're obviously not going to find some secret government apps that may or may not exist on github this comparison has reached its endpoint.

Suffice to say Signal, in the hands of experts, would have been secure; and the greatest efforts of the Pentagon would have failed to keep this information out of the news after having invited a blabbing journalist to participate.

No this doesn't have much to do with anything, it just irks me when people throw in baseless implications. *posh accents* "Oh Signal, so pedestrian, not like our highly professional cyberwarfare division, haven't they seen movies? There are cool user interfaces any with lots of maps and everything!"

BS, look at what happened with the obamacare website.

Todd Park, the U.S. chief technology officer, initially said on October 6 that the glitches[clarification needed] were caused by unexpected high volume when the site drew 250,000 simultaneous users instead of the 50,000-60,000 expected. He claimed that the site would have worked with fewer simultaneous users.

These are our "experts"? You tell a nation of 300 million that something great is about to be accessible and assume  that less than 0.083% would look at the same time?

That's not even the real issue, the real issue is that correctly written software responds to over-volume by failing to respond to all requests, not by introducing errors. I know with absolute certainty that they simply failed to design and implement a stable API / Database.

They paid $1.7 billion for this. I have been on teams of five that could have delivered better in a year. If only I knew who to bribe *sigh*


If so, I don't understand why anyone would assume that this is the only time they would ever engage in this.
It's not a structure though, it's information. Releasing some doesn't compromise the rest.

... and yea if it was intentional that implies that they would be willing to do it again, but under that conditional who cares?

The only point of classification is to keep a secret at POTUS discretion, if he or his underlings think there is an advantage in a pretend leak or open declassification what of it?


So because nothing interfered with the operation, nothing could have interfered with it and it was never dangerous.
That argument is wrong (and not one I made), but the conclusion could be true for all you know; and that was my point.

If the leak did result in problems that would be a reason to believe it was not intentional, but since it did not; that remains a possibility.


My problem with this is what we know it wasn't false and we don't know if it was useless.
We don't know a lot.


If you want to argue that it's beneficial to do this
Misdirection is certainly beneficial in war.  I am simply saying we don't have enough information to distinguish an idiotic Trump admin from an age old tactic at this point.


I don't think it's valuable to the government to set a standard that there are active leaks in the system by creating new holes in it.
Again with the hole analogy. If it was intentional it's not a hole. More information isn't going to just keep flowing out of it. For all you know that "hole" led to a bucket which was carefully filled for a reason.

As for whether it benefits a government to appear weak in some way, that depends. When attempting to negotiate with enemies with threats and allies with promises the appearance is a disadvantage, but when in active contest appearing weak where you are strong is ideal.
ADreamOfLiberty
ADreamOfLiberty's avatar
Debates: 0
Posts: 4,404
3
2
2
ADreamOfLiberty's avatar
ADreamOfLiberty
3
2
2
-->
@WyIted
There is a myth that the government has stronger encrypted apps than what they actually do.
That is certainly a myth since unbreakable encryption is very easy to achieve.


Open source is always going to be stronger than anything proprietary because literally millions of people are looking for exploits in open source software. 
Probably more like a hundred thousand. Most people don't have the time or interest.

Open source security is like an impenetrable shell. Invulnerable, but it's also true that there can be advantages to secret software. Strategies that only work when they are secret. Viruses more than encryption fall into this category.

It's almost unheard of that a virus can't be defended against when you have it's source code. The reason they work is because they exploit a vulnerability that the defender hasn't imagined.

The inverse is true for defense, where the more people who can imagine attacks, the stronger it becomes.

Open Source Defense = Best
Open Source Attack = Fail
Secret Defense = OK
Secret Attack = Best
ADreamOfLiberty
ADreamOfLiberty's avatar
Debates: 0
Posts: 4,404
3
2
2
ADreamOfLiberty's avatar
ADreamOfLiberty
3
2
2
-->
@whiteflame

but if a lot of people who are in the know are decrying this for this specific flaw, then I assume that the existing communication methods include something that can get around it.
They aren't.

1-5 people are consulted by propagandists in the AP cabal and then they repeat the same claim a hundred times.


We know this from all the times statistically unlikely similarities in phrasing and timing occur in headlines and articles. It is also very often the case that the "expert quotes" reveal a shallow level of expertise, or at least an attempt at dumbing down that went too far.


It's very similar to the people who think because they hear some non-sense from Michio Kaku or Neil DeGrasse Tyson that there is some kind of consensus among physicists that trees don't fall in the forest if you don't hear them fall.
WyIted
WyIted's avatar
Debates: 34
Posts: 7,636
3
4
9
WyIted's avatar
WyIted
3
4
9
-->
@ADreamOfLiberty
"phone's secure enclave", the implication that a phone is more secure than a PC is naive. Maybe an iphone because of their rather wise policy of using full drive encryption without making users jump through too many hoops.
I think the statement is about a created stored enclave on the phone and saying that multiple devices can receive information from signal. You can protect against multiple devices having access to your signal messages but the statement is that messages have the potential to live outside of that secure enclave if you use signal on multiple devices
WyIted
WyIted's avatar
Debates: 34
Posts: 7,636
3
4
9
WyIted's avatar
WyIted
3
4
9
Ideally journalists are uses MDMs set up by professionals in their organizations to help them and certainly the director of national intelligence should be and most likely is.
ADreamOfLiberty
ADreamOfLiberty's avatar
Debates: 0
Posts: 4,404
3
2
2
ADreamOfLiberty's avatar
ADreamOfLiberty
3
2
2
-->
@WyIted
You can protect against multiple devices having access to your signal messages but the statement is that messages have the potential to live outside of that secure enclave if you use signal on multiple devices
The message needs to be on at least two devices to communicate.

The number of devices is irrelevant. All that matters is whether EVERY repository of message data is encrypted.

The implication was that the desktop version of signal did not encrypt the data. This is false, I proved it in five minutes. What kind of expert wouldn't have looked at Signal desktop before commenting for so called mainstream news? What kind of expert would have assumed if they didn't have time to look it up?
WyIted
WyIted's avatar
Debates: 34
Posts: 7,636
3
4
9
WyIted's avatar
WyIted
3
4
9
Do we all agree that Walz should be fired though? I mean can we trust this was an honest mistake when this guy is aligned with neocons?
WyIted
WyIted's avatar
Debates: 34
Posts: 7,636
3
4
9
WyIted's avatar
WyIted
3
4
9
-->
@ADreamOfLiberty
I don't think any expert who has stated signal is insecure can be trusted, particularly since it's approved for use of top officials.
WyIted
WyIted's avatar
Debates: 34
Posts: 7,636
3
4
9
WyIted's avatar
WyIted
3
4
9
The media keeps pushing this commercial app thing implying the government can come up with something more secure. Literally top secret information has been shared between officials over signal since obama
WyIted
WyIted's avatar
Debates: 34
Posts: 7,636
3
4
9
WyIted's avatar
WyIted
3
4
9
I am just glad it's not the conservative media pushing this narrative to Boomers. 

Walz deserves criticism but implying the use of this app is irresponsible is silly especially since every administration has used signal since it was invented
WyIted
WyIted's avatar
Debates: 34
Posts: 7,636
3
4
9
WyIted's avatar
WyIted
3
4
9
Wait until they find out that American spies use Tor to communicate. 

"Why are spies being put in danger by sharing secrets over the commercially available Tor network"