Skip to content

The Guardian and Cambridge University's Department of Computer Science unveil new secure technology to protect sources

Technology
64 23 303
  • Academic paper: https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-999.pdf

    Technical summary: it seems OK against an observer who can see the network traffic but hasn't infiltrated the phone of the source or the computer of the news organization.

    Any real message is stored locally on the smartphone by the CoverDrop module and sent as the next CoverDrop message, i.e. replacing the dummy message which would otherwise have been sent. Consequently a network observer cannot determine whether any communication is taking place and CoverDrop therefore provides the potential source with plausible deniability.

    The CoverNode and each journalist has their own public-private key pair. These keys are published by the news organization and available to the CoverDrop module directly so the user does not need know about them. When the CoverDrop module is used for the first time, it generates a new, random public-private key pair
    for the user.

    All real CoverDrop messages sent by the CoverDrop module to the CoverNode include the text written by the potential source as well as their own public key. The message is first encrypted using the public key of the journalist who will ultimately receive the message, then encrypted a second time using the public key of the CoverNode. All dummy CoverDrop messages are encrypted using the public key of the CoverNode. All messages, real or dummy, are arranged to be the same, fixed length. Encryption and length constraints ensure that only the CoverNode can distinguish between real and dummy messages.

  • Technical summary: it seems OK against an observer who can see the network traffic but hasn't infiltrated the phone of the source or the computer of the news organization.

    Any real message is stored locally on the smartphone by the CoverDrop module and sent as the next CoverDrop message, i.e. replacing the dummy message which would otherwise have been sent. Consequently a network observer cannot determine whether any communication is taking place and CoverDrop therefore provides the potential source with plausible deniability.

    The CoverNode and each journalist has their own public-private key pair. These keys are published by the news organization and available to the CoverDrop module directly so the user does not need know about them. When the CoverDrop module is used for the first time, it generates a new, random public-private key pair
    for the user.

    All real CoverDrop messages sent by the CoverDrop module to the CoverNode include the text written by the potential source as well as their own public key. The message is first encrypted using the public key of the journalist who will ultimately receive the message, then encrypted a second time using the public key of the CoverNode. All dummy CoverDrop messages are encrypted using the public key of the CoverNode. All messages, real or dummy, are arranged to be the same, fixed length. Encryption and length constraints ensure that only the CoverNode can distinguish between real and dummy messages.

    To sum it up even more : this looks like standard end-to-end encryption, but any app user have the same network traffic, completed with fake data if no communication is needed.

  • Yeah but contrary to these listed, the judge know the guardian is a newspaper, they shouldn't be able to make him/her afraid in the same way they did.

    Yeah but contrary to these listed, the judge know the guardian is a newspaper

    The logic does not check out. Signal isn't going to integrate a news section and then suddenly be exempt from this regulation.

  • Yeah but contrary to these listed, the judge know the guardian is a newspaper

    The logic does not check out. Signal isn't going to integrate a news section and then suddenly be exempt from this regulation.

    It show you didn't read, I am explaining the article piece by piece. They used the lost a gave you to convince a judge it was a terrorist behavior. It is not forbidden to crypt things. And they would not have been able to convince a judge the news application guardian is a terrorist tool.
    And I am bad a English so I am trying to resume a English article to you in broken English. I am sure I use the wrong word and as long as you don't read you can keep playing me. You are taking more time debating things I have an hard time explain than reading the article.
    Do you wan me to copy paste in entirely here so you can avoid one click ?

  • It show you didn't read, I am explaining the article piece by piece. They used the lost a gave you to convince a judge it was a terrorist behavior. It is not forbidden to crypt things. And they would not have been able to convince a judge the news application guardian is a terrorist tool.
    And I am bad a English so I am trying to resume a English article to you in broken English. I am sure I use the wrong word and as long as you don't read you can keep playing me. You are taking more time debating things I have an hard time explain than reading the article.
    Do you wan me to copy paste in entirely here so you can avoid one click ?

    I read the entire thing. I don't need it explained to me. It's clear just by looking at it that they're targeting all encrypted communications.

    And they would not have been able to convince a judge the news application guardian is a terrorist tool.

    I think it's pretty obvious that they could.

  • Except that signal is blocked by many companies Mobile Device Management. The one that don’t can typically see who has the app installed. This provides a new clever way to maybe whistleblow

    Why would you expect any form of privacy on a device you don't own?

  • Why would you expect any form of privacy on a device you don't own?

    I never said I did?

  • I never said I did?

    Not "you" necessarily, "one".

    I bring it up because you mentioned company MDM blocking signal. The fact that company MDM is active indicates its a company device (if it's not that's an entirely different conversation).

    So why would one expect privacy on a device they don't own?

  • Not "you" necessarily, "one".

    I bring it up because you mentioned company MDM blocking signal. The fact that company MDM is active indicates its a company device (if it's not that's an entirely different conversation).

    So why would one expect privacy on a device they don't own?

    Well more I’m pointing to the idea that you may be trying to whistleblow on said company and this may provide a more succinct way to do so

  • Well more I’m pointing to the idea that you may be trying to whistleblow on said company and this may provide a more succinct way to do so

    I get that, but it's more logical to me that of I'm going to whistleblow on a company to not use one of their devices to do it. That way it doesn't matter what apps are or are not secure, you're not using their device that can potentially track you.

  • Tech support 'trained monkey’ fixed problem with two fingers

    Technology technology
    7
    1
    31 Stimmen
    7 Beiträge
    55 Aufrufe
    S
    I can understand why some programs only allow a single copy to be opened at once, something like email makes sense. However on Linux they got this right... if you try to open a program that is already running, it switches to the screen that program is on and restores the program window to the desktop. There's no guessing why the program "won't open", it just makes the logical choice that you want to see it. Heh that reminds me of another detail from that call... the guy also wasn't willing to reboot his computer (which would have solved the problem as well), but berated me for not knowing what I was doing for making the suggestion. Dude, it's Windows, things break constantly and a reboot generally resolves the issue.
  • 965 Stimmen
    101 Beiträge
    379 Aufrufe
    D
    That's always worth considering. A phone app doesn't take a big operating budget to launch and maintain. Especially for state-actors.
  • 35 Stimmen
    1 Beiträge
    13 Aufrufe
    Niemand hat geantwortet
  • Understanding the impacts of generative AI use on children

    Technology technology
    4
    50 Stimmen
    4 Beiträge
    31 Aufrufe
    S
    That's fine, just use ChatGPT...
  • Meta Filed a Lawsuit Against The Entity Behind CrushAI Nudify App.

    Technology technology
    21
    1
    92 Stimmen
    21 Beiträge
    117 Aufrufe
    L
    I know everybody hates AI but to me it's weird to treat artificially generated nudity differently from if somebody painted a naked body with a real person's face on it - which I assume would be legally protected freedom of expression.
  • 110 Stimmen
    84 Beiträge
    349 Aufrufe
    T
    It's not new technology you numpty. It's not news. It's not a scientific paper. Wireless energy transfer isn't "bullshit", it's been an understood aspect of physics for a long time. Since you seem unable to grasp the concept, I'll put it in bold and italics: This is a video of a guy doing a DIY project where he wanted to make his setup as wireless as possible. In the video he also goes over his thoughts and design considerations, and explains how the tech works for people who don't already know. It is not new technology. It is not pseudoscience. It is a guy showing off his bespoke PC setup. It does not need an article or a blog post. He can post about it in any form he wants. Personally, I think showcasing this kind of thing in a video is much better than a wall of text. I want to see the process, the finished product, the tools used and how he used them.
  • Duolingo CEO tries to walk back AI-first comments, fails

    Technology technology
    134
    758 Stimmen
    134 Beiträge
    514 Aufrufe
    kingthrillgore@lemmy.mlK
    I think on iOS they added a thing where it would change based on the days you didn't use Duolingo. Honestly at this point I think it speaks more about the sorry state of their company more than anything.
  • 220 Stimmen
    99 Beiträge
    384 Aufrufe
    G
    In highrises with lots of stops and users, it uses some more advanced software to schedule the optimal stops, or distribute the load between multiple lifts. A similar concept exists for HDD controllers, where the read write arm must move to different positions to load data stored on different plates and sectors, and Repositioning the head is a slow and expensive process that cuts down the data transfer rate.