Wednesday, 3 December 2014

Keep it secure, keep it safe

On November 6, 2014, the Electronic Frontier Foundation (EFF) released the Secure Messaging Scorecard in an effort to disclose the security and privacy capabilities of 39 messaging apps. Its findings, based on rating each app on seven different criteria, confirmed that many of today’s most widely used messaging services do not provide the level of security consumers need in order to protect themselves against internet surveillance, data collection, and snooping in general.

Messaging services whose names feature in everyday parlance—AIM, BlackBerry Messenger, Facebook Chat, Google Hangouts, SnapChat, Skype, Viber, WhatsApp, and Yahoo Messenger—do little more than encrypt communication while in transit. Such limited security leaves messages and conversations conducted through these platforms to be read by the provider and/or shared with the government. Despite their security concerns, the ease of accessibility and ubiquity of these apps have kept them in high demand thus far.

Last week, however, we were reminded that consumers will not need to choose between user-friendliness and security forever. WhatsApp’s ratings on the Secure Messaging Scorecard are already arguably about to rise: on November 17, Open Whisper Systems announced a partnership with WhatsApp, as well as a plan to bring end-to-end encryption (unreadable messaging) to hundreds of millions of WhatsApp users. Security and usability, all in one. As stated on the Kaspersky Lab blog: “The bottom line with the WhatsApp crypto announcement is this: WhatsApp is among the most popular and valuable pure messaging services around. That they are starting to take security and privacy very seriously is great news, and hopefully WhatsApp’s competitors will soon follow WhatsApp’s lead.”

SumRando is part of a growing movement to make secure, easy-to-use messaging accessible to its client-base. SumRando Messenger is a real time chat app that encrypts your communication in transit and on our server. Our service is unique in that it automatically deletes most or all read messages (you decide) in addition to giving you the option to clear your entire conversation from both sides and from our server at any time. SumRando Messenger recognizes that its consumers do not want to sacrifice privacy or simplicity.

We encourage you to read about and download SumRando Messenger. As we continue to develop SumRando Messenger and add more features, we welcome your feedback at Help us make SumRando Messenger the secure, user-friendly experience that you know you deserve.

Thursday, 4 September 2014

Germany Considering New Cybersecurity Law

The German Government is considering a new cybersecurity law meant to strengthen existing protections with new minimum security standards for companies to follow.  About the law, InsidePrivacy (privacy analysis by Covington & Burling LLP) notes its resemblance to efforts across the EU, following much of the EU Dirlaw similar to this effort had been considered in Germany last spring without success.
ective on Network and Information Security (“NIS”).

They report that the key difference between the EU directive and the German law is "the reporting obligations under the proposed IT Security Law go further than those in the NIS Directive and the German proposal contains additional obligations in particular for telecommunications providers and providers of commercial information society services."

Commenting on the draft of the law published by The German Federal Ministry of the Interior, InsidePrivacy describes the main objectives of the new law as the following:
  1. Improved IT security of companies: in particular, providers of critical infrastructures will be required to implement and maintain appropriate minimum organizational and technical security standards in order to ensure the proper operation and permanent availability of those infrastructures and to report significant IT security incidents.

  2. Protecting citizens online: Increased security standards but also additional information obligations vis-à-vis users/subscribers.

  3. Strengthening the Federal Office for Information Security (“BSI”): The BSI shall act as the national information security authority and centralized information hub with regard to any sort of cyber-attack or other impairment of information systems of critical infrastructures. For this purpose, the BSI will collect and analyze essential information in relation to IT security and to inform operators of critical infrastructures and competent authorities but can also provide information about providers’ compliance with security requirements and security incidents and liaise with third parties (such as providers) to identify and warn affected users. The BSI will publish technical guidelines on security measures.  Among other things, the BSI will be empowered to (i) investigate IT products, systems and services and to disclose and publish its evaluation of the security of the investigated products, systems and services; (ii) request from the providers of critical infrastructures a copy of audit and certification results prepared to prove compliance; (iii) request immediate removal of security defects.

  4. Expanding the competences of the Federal Criminal Police Office (BKA): the BKA will become competent for police tasks regarding the prosecution of cybercrimes insofar as they are directed against the security of Germany or certain vital facilities.

  5. Protecting the IT security of the German Government and federal administration: the BSI will obtain the power to issue mandatory requirements for the IT of the federal state.

The Government must approve the measure before it is sent to the parliament for approval.  To read more detail about the law -- its scope, its requirements for those in the private sector, among other things -- check out InsidePrivacy's detailed analysis.

Monday, 11 August 2014

Moving Past Privacy-Poaching Facebook Messenger

Facebook is again making privacy headlines.  Sources have discovered that Facebook's new Messenger app has a laughably invasive list of terms and conditions to which users must agree.  What is worse is that this app replaces messaging services offered within the main Facebook app, trying to force millions of users to agree to terms no one should have agree to.

According to The Toronto Star, the app can access personal information and also take action based on the data discovered.  For instance, users will allow the app to do the following:

  • Call phone numbers without your intervention and sending text messages;

  • Record audio with the microphone, and taking photos and videos with the camera, without your confirmation;

  • Read your phone’s call log.
  • By contrast, services like our SumRando Messenger are security-focused and privacy-protecting while still being easy to use and convenient on the go.  We have gone out of our way to design an app that protects users and those they message while other services continue to force unfair terms on their users.

    You should not have to worry about anyone collecting information from you and also take invasive action based on that information.  In contrast to Facebook Messenger, these are a few of our specs:
    • Two forms of encryption (AES-256 and SSL) to keep your messages secure
    • No direct link between your phone number, device email address, or other identifying account; the decision on who you want to communicate with is strictly yours
    • Messages automatically deleted upon logout with only 10 messages stored (if you do not clear you conversation) stored for future conversational reference.
    See the difference?  We don't believe consumers should have to choose between privacy and convenience.  What remains striking is just how many major developers try to force consumers to make that choice.

    The benefit of a story like this about Facebook Messenger is that it is a story that could attract millions of Facebook users to take privacy concerns seriously.  One of the largest social media and messaging companies in the world has taken a stand against privacy, and their users are retaliating.

    What remains to be seen are two things: How many users will refuse this new Messenger app and what Facebook will do (if anything) to bring them back into the fold.

    Wednesday, 6 August 2014

    Cyber-exposed Thailand Prepares New Security Measures

    It's no secret that Thailand lacks sufficient cyber infrastructure.  Rated third among the 10 worst countries for internet safety by UK security firm Sophos, Thailand experiences significant exposure to malware attacks.  Around 20.8% of PCs experience malware attacks in a span of three months.  To put that figure in perspective, the safest countries (Norway, Sweden, and Japan) range from 2.6 to 1.8%, and the most dangerous country (Indonesia) is only a little higher than Thailand at 23.5%.  Research has shown the country is additionally susceptible to ATM-related and government cyber attacks. (Needless to say, Thailand is somewhere you would want to use a VPN.)

    Surangkana Wayuparb, Director of Thailand's
    Electronic Transactions Development Agency
    Thailand made headlines this week when Surangkana Wayuparb, the country's Director of Electronic Transactions Development Agency, addressed the Regional Asia Information Security Exchange Forum in Bangkok.  Bangkok Post reports that Surangkana told those in attendance, "All these world records reflect that Thailand urgently needs to set up a national computer emergency response team (Cert) as a command centre to manage and collaborate on national cybersecurity threats and cyberwarfare... Cyberattacks pose a serious challenge to people at all levels, from end-users to enterprises and government agencies."

    According the Bangkok Post:

    “Surangkana said information security threats were no longer only technical dangers. They can have a major effect on the country's economy and national physical security. "Cyberattacks pose a serious challenge to people at all levels, from end-users to enterprises and government agencies,” Surangkana said… The ETDA [will] propose a national Cert to the junta. If approved, the ETDA expects a centre will be created by year-end. The creation of a national Cert is expected to upgrade the ETDA's existing computer emergency response team to a full national command centre, she said.”

    Read more about Thailand's cybersecurity plans at Bangkok Post.

    Saturday, 26 July 2014

    AddThis Tests 'Canvas Fingerprint' to Replace Cookies in 5,000+ Popular Sites

    A study conducted by Princeton University and Belgium’s KU Leuven University revealed that more than 5,000 of the top websites in the world have been testing "canvas fingerprint" technology intended to replace cookies, to track user data with most using popular widget AddThis.

    ProPublica insists that canvas fingerprints are "nearly impossible to block," and PC World describes the technology with the following:
    "An invisible image was sent to the browser, which rendered it and sent data back to the server. That data can then be used to create a 'fingerprint' of the computer, which could be useful for identifying the computer and serving targeted advertisements."
    AddThis Chief Executive Rich Harris accounted for their testing by saying they were seeking a "cookie alternative." According to ProPublica, Harris "considered the privacy implications of canvas fingerprinting before launching the test, but decided 'this is well within the rules and regulations and laws and policies that we have.'"

    Cookies have been around since the 1990s, and many internet users have routinely started to circumvent their influence.  Canvas fingerprints signaled the potential to track users' history in more covert ways, and AddThis appears to have tested their efficacy on thousands of sites, including and YouPorn.

    ProPublica explains, "[Canvas] fingerprints are unusually hard to block: They can’t be prevented by using standard Web browser privacy settings or using anti-tracking tools such as AdBlock Plus." You can test the canvas fingerprint technology yourself on ProPublica, to see what kind of image you produce to be translated into a unique ID number with the Canvas Fingerprinting in Action feature. 

    Below is an example, using ProPublica's feature:

    In order to curb the effects of canvass fingerprinting, ProPublica suggests the following strategies:
    • Use the Tor browser (Warning: can be slow)
    • Block JavaScript from loading in your browser (Warning: breaks a lot of web sites)
    • Use NoScript browser extension to block JavaScript from known fingerprinters such as AddThis (Warning: requires a lot of research and decision-making)
    • Use a browser extension that blocks JavaScript from known ad tracking companies such as AddThis. Extensions include Disconnect or AdBlockPlus browser extension with the EasyPrivacy filter installed. (Warning: Only blocks known ad tracking companies; other websites could still employ canvas fingerprinting)
    • Try the experimental browser extension Chameleon that is designed to block fingerprinting (Warning: only recommended for tech-savvy users at this point)
    • Install opt-out cookies from known fingerprinters such as AddThis (Warning: fingerprint will likely still be collected, companies simply pledge not to use the data for ad targeting or personalization)

    Monday, 21 July 2014

    Anonymous Re-Enters Israel-Palestine Fray in Support of Palestine

    Related to our previous post, hacker group Anonymous claimed to have taken down thousands of Israeli websites between July 11 and July 17 in support of the Palestinians, according to the International Business Times.  Today, Businessweek reports the group has claimed responsibility for hacking a top Kenyan military Twitter account, where they "called for retribution over the war in Gaza, Kenyan politicians to stand down and an end to tribalism."

    These attacks follow others against Israel by Anonymous in the recent past, including cyber attacks conducted in April in which the group urged allies "to hack, deface, hijack, database leak, admin takeover and DNS terminate the Israeli cyberspace by any means necessary.”

    To read more about Anonymous's involvement, you can follow their website.

    Cyber Warfare Underpinning Recent Gaza Strip Conflict

    If there's one easy thing for people to understand about cybersecurity and cyber warfare, it's that there is a usually a strong presence of cyber attacks when there are threats of or actions of more traditional warfare.  While cyber warfare produces tangible technological, organizational, and economic damages, it can also be used as a form a psychological warfare.

    A recent example comes out of escalated tensions in the Gaza Strip, where Hamas has used technology in service of their objective aims and Israelis have responded defensively.  Bloomberg reports that cyber attacks related to escalated tensions in the Gaza Strip have risen tenfold in the last few weeks.

    Bloomberg reported about a recent attack involving a popular international pizza company:
    During the time hackers controlled the Domino’s Facebook page, status updates included a threat to “strike deep inside Israel.” After Domino’s regained control, it posted an image of a masked man wearing a headband in Hamas’s signature green color, with the caption, “You can’t defeat the Israeli hunger for pizza!”

    Israeli hackers didn’t stand idly by. They left some Hamas websites disabled for hours and others displaying content maligning the Islamist group and its leaders. 
    An Israeli response to Hamas attack on the Domino's Facebook page translates as "“You can’t defeat the Israeli hunger for pizza!" according to Bloomberg.
     Some in Israel suggest that Hamas is also slowing internet service in addition to internet hacking and defacement like that which is being attributed to them in accounts like the above.  In forging a response, Israel cannot simply shut down access since their opposition generally do not use Israeli internet access to begin with.  Some analysis suggest attacks against Israel are being conducted by sympathizers abroad, which would make restricting internet access less effective in response.

    The Israeli Internet Association's Dina Beer characterized the activity in the following way: “The attacks aren’t sophisticated; they just give the feeling that someone else is in control... It’s terrorism, designed mostly to frighten: ‘See, we can control your sites and do things you don’t want us to do.’ And it works.”

    For more about these recent cyber developments underpinning the ground and air game in the Gaza Strip, head over the Bloomberg.