[liberationtech] BlackBerry and CALEA-II

Jacob Appelbaum jacob at appelbaum.net
Mon Apr 29 14:44:18 PDT 2013


Griffin Boyce:
> Jacob Appelbaum <jacob at appelbaum.net> wrote:
> 
>> Griffin Boyce:
>>> I disagree.  Blackberry isn't openly selling your data or
>>> otherwise gifting it to third parties, but I don't think that's
>>> really enough.
>> 
>> That is exactly what they're doing. They have a key that is static
>> and from what I've heard, disclosed to LE and intel agencies,
>> specifically to retain or to enhance their marketshare.
>> 
> 
> Well, their market share is enhanced more by shiny packaging and 
> bullshitting their customers into thinking their phones are secure.
> 

That is exactly my point. They're selling out their end users because
their real "customers" are either carriers or governments.

> 
>>> Keep in mind that all PINs are 8-digit hex strings. Narrows the
>>> field a bit. ;P
>> The PIN is just the hardware identifier as I understand things -
>> that isn't my concern - my concern is the fixed key.
> 
> 
> Granted, but you need to determine the PIN (and then spoof it), for 
> PIN-to-PIN Blackberry messages.
> 

Neither of those things matters to me at all. That is - if I can decrypt
your messages, I can trivially recover your PIN if you ever send any
message with it, ever.

> You already know this, but for the benefit of the list:  There's a 
> difference between BBM messages and Pin-to-Pin messages.  With BBM,
> you have to request permission to be added to their list and then you
> both mutually approve each other.  With Pin-to-Pin, you can send
> anyone a message if you have their PIN.  A PIN message is similar to
> email, and displays red in your "messages" queue. BBM is threaded and
> closer to chat. As of Blackberry v10 (I believe), BBM no longer uses
> a PIN, but the BBID.
> 

Unless these are on a BES server - it's all insecure - if it is on a BES
server, it may still be insecure depending on a few factors.

> Also, while a PIN message can be encrypted, the default option on
> both a BES ~and~ PIN messages is to not be encrypted.

Solidly awful.

> 
> What REALLY scares me about this is how many medical providers use 
> Blackberry products in their practices.  A stolen PIN coupled with a
> poorly set-up BES could lead to a serious privacy breach.

Well, sure. It would be as bad as every other BlackBerry device
normally. A real joy, I tell you.

> 
> Andrés Leopoldo Pacheco Sanfuentes <alps6085 at gmail.com> wrote:
> 
>> Are there "truly secure" solutions? I don't think so.. especially
>> not when we add the qualifier "of mass consumption "
>> 
> That's probably the real question.  It probably doesn't exist with 
> off-the-shelf solutions.

Yes, it does. There have been off-the-shelf solutions for decades. Some
require a clearance or connections (eg: STU-III), others require money
(eg: cryptophone ), still others require some technical skill (eg:
Guardian apps on Android).

There are obviously degrees of secure.

> TextSecure is useful and secure, but the
> network effect applies there as everywhere else.  If I send you an
> encrypted text, and you don't use the same app, you can't reasonably
> decrypt it.

That isn't really a problem as far as I'm concerned.

> Cryptocat mobile would be a game-changer here, but it
> also doesn't allow for asynchronous communication since it's a chat
> program.  And both parties would still need to use it.
> 

GibberBot with OTR provides the same set of features without all of the
home rolled crypto problems, the web related problems or a third party
that you're not already using on a daily basis.

> I'm not sure there's a full solution right now.  Definitely a market 
> opportunity.
>

I suggest you check out Cryptophone:

 http://www.cryptophone.de/

I've been a reasonably happy user on and off since ~2003.

All the best,
Jacob



More information about the liberationtech mailing list