[liberationtech] BlackBerry and CALEA-II
Griffin Boyce
griffinboyce at gmail.com
Mon Apr 29 13:59:43 PDT 2013
Jacob Appelbaum <jacob at appelbaum.net> wrote:
> Griffin Boyce:
> > I disagree. Blackberry isn't openly selling your data or otherwise
> > gifting it to third parties, but I don't think that's really enough.
>
> That is exactly what they're doing. They have a key that is static and
> from what I've heard, disclosed to LE and intel agencies, specifically
> to retain or to enhance their marketshare.
>
Well, their market share is enhanced more by shiny packaging and
bullshitting their customers into thinking their phones are secure.
> > Keep in mind that all PINs are 8-digit hex strings. Narrows the field a
> > bit. ;P
> The PIN is just the hardware identifier as I understand things - that
> isn't my concern - my concern is the fixed key.
Granted, but you need to determine the PIN (and then spoof it), for
PIN-to-PIN Blackberry messages.
You already know this, but for the benefit of the list: There's a
difference between BBM messages and Pin-to-Pin messages. With BBM, you
have to request permission to be added to their list and then you both
mutually approve each other. With Pin-to-Pin, you can send anyone a
message if you have their PIN. A PIN message is similar to email, and
displays red in your "messages" queue. BBM is threaded and closer to chat.
As of Blackberry v10 (I believe), BBM no longer uses a PIN, but the BBID.
Also, while a PIN message can be encrypted, the default option on both a
BES ~and~ PIN messages is to not be encrypted.
What REALLY scares me about this is how many medical providers use
Blackberry products in their practices. A stolen PIN coupled with a poorly
set-up BES could lead to a serious privacy breach.
Andrés Leopoldo Pacheco Sanfuentes <alps6085 at gmail.com> wrote:
> Are there "truly secure" solutions? I don't think so.. especially not when
> we add the qualifier "of mass consumption "
>
That's probably the real question. It probably doesn't exist with
off-the-shelf solutions. TextSecure is useful and secure, but the network
effect applies there as everywhere else. If I send you an encrypted text,
and you don't use the same app, you can't reasonably decrypt it. Cryptocat
mobile would be a game-changer here, but it also doesn't allow for
asynchronous communication since it's a chat program. And both parties
would still need to use it.
I'm not sure there's a full solution right now. Definitely a market
opportunity.
best,
Griffin
--
Technical Program Associate, Open Technology Institute
#Foucault / PGP: 0xAE792C97 / OTR: saint at jabber.ccc.de
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.stanford.edu/pipermail/liberationtech/attachments/20130429/e60903a4/attachment.html>
More information about the liberationtech
mailing list