listen here

Patriot Broadcast From the Trenches Schedule 

Or you can mail donations to Henry Shivley at P.O. Box 964, Chiloquin, OR 97624

The Threat of Silence – Meet the groundbreaking new encryption app set to revolutionize privacy and freak out the feds

mike jankeSlate – by Ryan Gallagher

For the past few months, some of the world’s leading cryptographers have been keeping a closely guarded secret about a pioneering new invention. Today, they’ve decided it’s time to tell all.

Back in October, the startup tech firm Silent Circle ruffled governments’ feathers with a “surveillance-proof” smartphone app to allow people to make secure phone calls and send texts easily. Now, the company is pushing things even further—with a groundbreaking encrypted data transfer app that will enable people to send files securely from a smartphone or tablet at the touch of a button. (For now, it’s just being released for iPhones and iPads, though Android versions should come soon.) That means photographs, videos, spreadsheets, you name it—sent scrambled from one person to another in a matter of seconds.

“This has never been done before,” boasts Mike Janke, Silent Circle’s CEO. “It’s going to revolutionize the ease of privacy and security.”

True, he’s a businessman with a product to sell—but I think he is right.

The technology uses a sophisticated peer-to-peer encryption technique that allows users to send encrypted files of up to 60 megabytes through a “Silent Text” app. The sender of the file can set it on a timer so that it will automatically “burn”—deleting it from both devices after a set period of, say, seven minutes. Until now, sending encrypted documents has been frustratingly difficult for anyone who isn’t a sophisticated technology user, requiring knowledge of how to use and install various kinds of specialist software. What Silent Circle has done is to remove these hurdles, essentially democratizing encryption. It’s a game-changer that will almost certainly make life easier and safer for journalists, dissidents, diplomats, and companies trying to evade state surveillance or corporate espionage. Governments pushing for more snooping powers, however, will not be pleased.

By design, Silent Circle’s server infrastructure stores minimal information about its users. The company, which is headquartered in Washington, D.C., doesn’t retain metadata (such as times and dates calls are made using Silent Circle), and IP server logs showing who is visiting the Silent Circle website are currently held for only seven days. The same privacy-by-design approach will be adopted to protect the security of users’ encrypted files. When a user sends a picture or document, it will be encrypted, digitally “shredded” into thousands of pieces, and temporarily stored in a “Secure Cloud Broker” until it is transmitted to the recipient. Silent Circle, which charges $20 a month for its service, has no way of accessing the encrypted files because the “key” to open them is held on the users’ devices and then deleted after it has been used to open the files. Janke has also committed to making the source code of the new technology available publicly “as fast as we can,” which means its security can be independently audited by researchers.

The cryptographers behind this innovation may be the only ones who could have pulled it off. The team includes Phil Zimmermann, the creator of PGP encryption, which is stillconsidered the standard for email security; Jon Callas, the man behind Apple’s whole-disk encryption, which is used to secure hard drives in Macs across the world; and Vincent Moscaritolo, a top cryptographic engineer who previously worked on PGP and for Apple. Together, their combined skills and expertise are setting new standards—with the results already being put to good use.

 According to Janke, a handful of human rights reporters in Afghanistan, Jordan, and South Sudan have tried Silent Text’s data transfer capability out, using it to send photos, voice recordings, videos, and PDFs securely. It’s come in handy, he claims: A few weeks ago, it was used in South Sudan to transmit a video of brutality that took place at a vehicle checkpoint. Once the recording was made, it was sent encrypted to Europe using Silent Text, and within a few minutes, it was burned off of the sender’s device. Even if authorities had arrested and searched the person who transmitted it, they would never have found the footage on the phone. Meanwhile, the film, which included location data showing exactly where it was taken, was already in safe hands thousands of miles away—without having been intercepted along the way—where it can eventually be used to build a case documenting human rights abuses.

One of the few people to have tested the new Silent Circle invention is Adrian Hong, the managing director of Pegasus Strategies, a New York-based consulting firm that advises governments, corporations, and NGOs. Hong was himself ensnared by state surveillance in 2006 and thrown into a Chinese jail after getting caught helping North Korean refugees escape from the regime of the late Kim Jong Il. He believes that Silent Circle’s new product is “a huge technical advance.” In fact, he says he might not have been arrested back in 2006 “if the parties I was speaking with then had this [Silent Circle] platform when we were communicating.”

But while Silent Circle’s revolutionary technology will assist many people in difficult environments, maybe even saying lives, there’s also a dark side. Law enforcement agencies will almost certainly be seriously concerned about how it could be used to aid criminals. The FBI, for instance, wants all communications providers to build in backdoorsso it can secretly spy on suspects. Silent Circle is pushing hard in the exact opposite direction—it has an explicit policy that it cannot and will not comply with law enforcement eavesdropping requests. Now, having come up with a way not only to easily communicate encrypted but to send files encrypted and without a trace, the company might be setting itself up for a serious confrontation with the feds. Some governments could even try to ban the technology.

Janke is bracing himself for some “heat” from the authorities, but he’s hopeful that they’ll eventually come round. The 45-year-old former Navy SEAL commando tells me he believes governments will eventually realize that “the advantages are far outweighing the small ‘one percent’ bad-intent user cases.” One of those advantages, he says, is that “when you try to introduce a backdoor into technology, you create a major weakness that can be exploited by foreign governments, hackers, and criminal elements.”

If governments don’t come round, though, Silent Circle’s solution is simple: The team will close up shop and move to a jurisdiction that won’t try to force them to comply with surveillance.

“We feel that every citizen has a right to communicate,” Janke says, “the right to send data without the fear of it being grabbed out of the air and used by criminals, stored by governments, and aggregated by companies that sell it.”

The new Silent Circle encrypted data transfer capability is due to launch later this week, hitting Apple’s App Store by Feb. 8. Expect controversy to follow.

This article arises from Future Tense, a collaboration among Arizona State University, the New America Foundation, and Slate. Future Tense explores the ways emerging technologies affect society, policy, and culture. To read more, visit the Future Tense blog and the Future Tense home page. You can also follow us on Twitter.

http://www.slate.com/articles/technology/future_tense/2013/02/silent_circle_s_latest_app_democratizes_encryption_governments_won_t_be.single.html

This entry was posted in News. Bookmark the permalink.
1186
Don't forget to answer the Security Question before you post comment.

8 Responses to The Threat of Silence – Meet the groundbreaking new encryption app set to revolutionize privacy and freak out the feds

  1. NC says:

    I see him either dead in a few days or his new invention will already be bypassed by the government even though he is making everyone believe it isn’t.

    Remember: The police have a radar detector detector. They are not that stupid to let this go that easily without a backdoor or regulation or worse, target killing.

    • diggerdan says:

      No doubt NC they actualy think we all are that damned gullible and F`n stupid. They know exactly what is being said and done. If they could actualy do that then why isn`t the pentagon using this kind of technology. Yup this is one big bs scam. like pete says below at 10:32. there is no privacy anywhere any more.

  2. pete says:

    it wont work – they own the network the data crosses.
    so they know who sent it, they know who recieved it and they probably know the content.

    and they can tunnel into iphone, blackberry & probably androids not using custom kernel & rom to see what’s on your phone.

  3. sc00ter313 says:

    For those of us who are really concerned about security and privacy: use encryption wherever you can. Encrypt everything. Also ASSUME that everything you do and say is being spied on. Nazi Israel and Australia have been contracted to capture everything we transmit here in Fascist Amerika because they do not need a warrant.
    Now that we know this: there is an old saying about computers “GI-GO” (Garbage in – Garbage out). On web sites that ask for personal information before you can get in: LIE, LIE, LIE! give different birth dates, use both sexes alternately, size of family, religion, ethnicity, personal income, size of company, different zip codes, different names, etc. NEVER lie where you are doing business where money changes hands, that is FRAUD. For the rest of those who gather your info: lie!
    Also use at least one of their key words that trigger a reading of what you send. Just put that word (there is a list http://www.forbes.com/sites/reuvencohen/2012/05/26/department-of-homeland-security-forced-to-release-list-of-keywords-used-to-monitor-social-networking-sites/ ) in EVERY communication you send out. If a lot of people do that: they will have a very bad case of INFORMATION OVERLOAD and have to hire more people or be forced to ignore a lot of stuff. Make those NAZI TURDS WORK !
    You’d be surprised at how confusing it is when somebody is looking for you because of all the conflicting information you can generate. I’ve been doing this for over 10 years. Honesty on the web when dealing with those sites that collect and sell personal data is not the best policy.

  4. Steve Apple says:

    Hey All
    I believe in doing the complete oppisite! STAND UP and start acting like men instead of slaves The truth should ring loud and clear no fkn codes thats how their paranoid cowardly world works with codes and signs and shadows and whispers quit your “master may I mentality” and stand up to be counted or retreat in cowardice, codes indeed.
    You can tell that murderous african that he dont scare Steve Apple one single bit and know if you come for me ,its a man who loves his freedom more than life on my knees, not a SLAVE who whispers “master may i have another” I say get the hell out of my country and take your fkn tribemembers with you
    Steve

    • diggerdan says:

      yep, and he can take all of those instigating snoops with him that are spying on us all and trying to take our rights that make us the proud and honorable country that we are.

    • # 1 NWO Hatr says:

      Why would we want him out of the country?

      It would be much easier to hang the communist traitor here.

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>

What is 5 + 4 ?
Please leave these two fields as-is:
IMPORTANT! To be able to proceed, you need to solve the following simple math (so we know that you are a human) :-)