Skip to content

The Guardian and Cambridge University's Department of Computer Science unveil new secure technology to protect sources

Technology
64 23 307
  • Academic paper: https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-999.pdf

    Technical summary: it seems OK against an observer who can see the network traffic but hasn't infiltrated the phone of the source or the computer of the news organization.

    Any real message is stored locally on the smartphone by the CoverDrop module and sent as the next CoverDrop message, i.e. replacing the dummy message which would otherwise have been sent. Consequently a network observer cannot determine whether any communication is taking place and CoverDrop therefore provides the potential source with plausible deniability.

    The CoverNode and each journalist has their own public-private key pair. These keys are published by the news organization and available to the CoverDrop module directly so the user does not need know about them. When the CoverDrop module is used for the first time, it generates a new, random public-private key pair
    for the user.

    All real CoverDrop messages sent by the CoverDrop module to the CoverNode include the text written by the potential source as well as their own public key. The message is first encrypted using the public key of the journalist who will ultimately receive the message, then encrypted a second time using the public key of the CoverNode. All dummy CoverDrop messages are encrypted using the public key of the CoverNode. All messages, real or dummy, are arranged to be the same, fixed length. Encryption and length constraints ensure that only the CoverNode can distinguish between real and dummy messages.

  • Technical summary: it seems OK against an observer who can see the network traffic but hasn't infiltrated the phone of the source or the computer of the news organization.

    Any real message is stored locally on the smartphone by the CoverDrop module and sent as the next CoverDrop message, i.e. replacing the dummy message which would otherwise have been sent. Consequently a network observer cannot determine whether any communication is taking place and CoverDrop therefore provides the potential source with plausible deniability.

    The CoverNode and each journalist has their own public-private key pair. These keys are published by the news organization and available to the CoverDrop module directly so the user does not need know about them. When the CoverDrop module is used for the first time, it generates a new, random public-private key pair
    for the user.

    All real CoverDrop messages sent by the CoverDrop module to the CoverNode include the text written by the potential source as well as their own public key. The message is first encrypted using the public key of the journalist who will ultimately receive the message, then encrypted a second time using the public key of the CoverNode. All dummy CoverDrop messages are encrypted using the public key of the CoverNode. All messages, real or dummy, are arranged to be the same, fixed length. Encryption and length constraints ensure that only the CoverNode can distinguish between real and dummy messages.

    To sum it up even more : this looks like standard end-to-end encryption, but any app user have the same network traffic, completed with fake data if no communication is needed.

  • Yeah but contrary to these listed, the judge know the guardian is a newspaper, they shouldn't be able to make him/her afraid in the same way they did.

    Yeah but contrary to these listed, the judge know the guardian is a newspaper

    The logic does not check out. Signal isn't going to integrate a news section and then suddenly be exempt from this regulation.

  • Yeah but contrary to these listed, the judge know the guardian is a newspaper

    The logic does not check out. Signal isn't going to integrate a news section and then suddenly be exempt from this regulation.

    It show you didn't read, I am explaining the article piece by piece. They used the lost a gave you to convince a judge it was a terrorist behavior. It is not forbidden to crypt things. And they would not have been able to convince a judge the news application guardian is a terrorist tool.
    And I am bad a English so I am trying to resume a English article to you in broken English. I am sure I use the wrong word and as long as you don't read you can keep playing me. You are taking more time debating things I have an hard time explain than reading the article.
    Do you wan me to copy paste in entirely here so you can avoid one click ?

  • It show you didn't read, I am explaining the article piece by piece. They used the lost a gave you to convince a judge it was a terrorist behavior. It is not forbidden to crypt things. And they would not have been able to convince a judge the news application guardian is a terrorist tool.
    And I am bad a English so I am trying to resume a English article to you in broken English. I am sure I use the wrong word and as long as you don't read you can keep playing me. You are taking more time debating things I have an hard time explain than reading the article.
    Do you wan me to copy paste in entirely here so you can avoid one click ?

    I read the entire thing. I don't need it explained to me. It's clear just by looking at it that they're targeting all encrypted communications.

    And they would not have been able to convince a judge the news application guardian is a terrorist tool.

    I think it's pretty obvious that they could.

  • Except that signal is blocked by many companies Mobile Device Management. The one that don’t can typically see who has the app installed. This provides a new clever way to maybe whistleblow

    Why would you expect any form of privacy on a device you don't own?

  • Why would you expect any form of privacy on a device you don't own?

    I never said I did?

  • I never said I did?

    Not "you" necessarily, "one".

    I bring it up because you mentioned company MDM blocking signal. The fact that company MDM is active indicates its a company device (if it's not that's an entirely different conversation).

    So why would one expect privacy on a device they don't own?

  • Not "you" necessarily, "one".

    I bring it up because you mentioned company MDM blocking signal. The fact that company MDM is active indicates its a company device (if it's not that's an entirely different conversation).

    So why would one expect privacy on a device they don't own?

    Well more I’m pointing to the idea that you may be trying to whistleblow on said company and this may provide a more succinct way to do so

  • Well more I’m pointing to the idea that you may be trying to whistleblow on said company and this may provide a more succinct way to do so

    I get that, but it's more logical to me that of I'm going to whistleblow on a company to not use one of their devices to do it. That way it doesn't matter what apps are or are not secure, you're not using their device that can potentially track you.

  • 79 Stimmen
    5 Beiträge
    0 Aufrufe
    L
    Can somebody TLDR and determine if there's any useful information in this article. I refuse to read quanta magazine. Edit: link to paper: https://eprint.iacr.org/2025/118
  • 18 Stimmen
    1 Beiträge
    8 Aufrufe
    Niemand hat geantwortet
  • Browser Alternatives to Chrome

    Technology technology
    14
    11 Stimmen
    14 Beiträge
    67 Aufrufe
    L
    I've been using Vivaldi as my logged in browser for years. I like the double tab bar groups, session management, email client, sidebar and tab bar on mobile. It is strange to me that tab bar isn't a thing on mobile on other browsers despite phones having way more vertical space than computers. Although for internet searches I use a seperate lighter weight browser that clears its data on close. Ecosia also been using for years. For a while it was geniunely better than the other search engines I had tried but nowadays it's worse since it started to return google translate webpage translation links based on search region instead of the webpages themselves. Also not sure what to think about the counter they readded after removing it to reduce the emphasis on quantity over quality like a year ago. I don't use duckduckgo as its name and the way privacy communities used to obsess about it made me distrust it for some reason
  • Is Matrix cooked?

    Technology technology
    54
    101 Stimmen
    54 Beiträge
    210 Aufrufe
    W
    Didn't know it only applied to UWP apps on Windows. That does seem like a pretty big problem then. it is mostly for compatibility reasons. no win32 programs are equipped to handle such granular permissions and sandboxing, they are all made with the assumption that they have access to whatever they need (other than other users' resources and things that require elevation). if Microsoft would have made that limitation to every kind of software, that Windows version would have probably been a failure in popularity because lots of software would have broken. I think S editions of windows is how they tried to go in that direction, with a more drastic way of simply just dropping support for 3rd party win32 programs. I don't still have a Mac readily available to test with but afaik it is any application that uses Apple's packaging format. ok, so if you run linux or windows utils in a compatibility layer, they still have less of a limited access? by which I mean graphical utilities. just tried with firefox, for macos it wanted to give me an .iso file (???) if so, it seems apple is doing roughly the same as microsoft with uwp and the appx format, and linux with flatpak: it's a choice for the user
  • Is Internet Content Too Engaging?

    Technology technology
    3
    5 Stimmen
    3 Beiträge
    27 Aufrufe
    T
    The number of tabs I have open from sites I’ve clicked on, started reading, said “eh, I’ll get back to this later” and never have, says no.
  • 376 Stimmen
    51 Beiträge
    38 Aufrufe
    L
    I believe that's what a write down generally reflects: The asset is now worth less than its previous book value. Resale value isn't the most accurate way to look at it, but it generally works for explaining it: If I bought a tool for 100€, I'd book it as 100€ worth of tools. If I wanted to sell it again after using it for a while, I'd get less than those 100€ back for it, so I'd write down that difference as a loss. With buying / depreciating / selling companies instead of tools, things become more complex, but the basic idea still holds: If the whole of the company's value goes down, you write down the difference too. So unless these guys bought it for five times its value, they'll have paid less for it than they originally got.
  • Nextcloud cries foul over Google Play Store app rejection

    Technology technology
    1
    1
    6 Stimmen
    1 Beiträge
    13 Aufrufe
    Niemand hat geantwortet
  • 0 Stimmen
    6 Beiträge
    39 Aufrufe
    P
    I applaud this, but I still say it's not far enough. Adjusted, the amount might match, but 121.000 is still easier to cough up for a billionaire than 50 is for a single mother of two who can barely make ends meet