Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

8/13/2013
01:06 PM
50%
50%

Silent Circle, Lavabit End Secure Email Services Due To Surveillance Concerns

Concerns about government surveillance could trigger mixed reactions among vendors in the market

The fallout from the controversy regarding the NSA's electronic surveillance programs has caused a firm providing encrypted email services to shutter its doors.

Silent Circle, which offers encryption services designed to shield everything from text messages to phone calls, says the decision to end its Silent Mail service reflects concerns regarding increased surveillance targeting users. With the move, it joins a company called Lavabit that suspended its operations last week, as well, due to concerns about government surveillance on the Internet.

The moves by the companies are the result of the ongoing ripples from the wave of controversy surrounding recent disclosures about NSA programs -- ripples that some predict could affect the secure messaging market in different ways.

"The thing to note about Silent Circle is that they are a niche cloud provider," says Paige Leidig, senior vice president at CipherCloud. "While they chose to shut down, the larger cloud provider titans, including likes Google and Microsoft, have a history of transparency reports that indicate they do not blindly comply with information requests. They also have the resources to mount a legal challenge which may not be an option for much smaller companies."

In a statement, Silent Circle chief technology officer Jon Callas said that Silent Mail was introduced because email was "fundamentally broken from a privacy perspective."

Silent Circle continues to offer other services that encrypt text messages and VoIP communications. The company says it does not log any metadata associated with these services and does not have the ability to decipher the content of calls and messages.

"With further thought -- and before we were served with any demands compounding this issue -- we decided it is in our users’ best interests to focus purely on peer-to-peer encrypted phone, text and videoconferencing services because the less information we have on how subscribers use our services, the better it is for everyone," Callas says.

"This is an unfortunate example of the chilling effect the current surveillance environment is having on innovative communications companies," he added. "While the majority of our government, commercial and consumer subscribers primarily use the unaffected apps that run on our peer-to-peer encrypted architecture -- like Silent Phone and Silent Text -- we apologize for any inconvenience this decision caused."

In a blog post, Lavabit owner Ladar Levison lamented being unable to share the exact circumstances that prompted his decision, but wrote that the decision was made after considerable "soul searching."

"This experience has taught me one very important lesson: without congressional action or a strong judicial precedent, I would _strongly_ recommend against anyone trusting their private data to a company with physical ties to the United States," he wrote.

Elsewhere in the industry, offered mixed predictions about how the mood of Web users and organizations will impact both the security market and trust on the Internet.

"The industry is full of visionaries and entrepreneurs who find inspiration in the marketplace to make the next generation of tools that businesses and consumers desire," Leidig said. "Judging from the significant jump in our prospect inquiries, many companies using cloud applications were rattled by the extent of the surveillance programs."

Steven Sprague, CEO of Wave Systems, says that instead of dropping services, a new market may open for protecting private communications on semi-public networks by using key servers located in different countries. This will ensure that government access to keys is dependent on the sovereign control of the country where the key server is, he explains.

"The challenge will be to establish the rules and notifications around these keys," he says. "I would also suggest that the challenge is to separate the messages and the keys requiring the companies to cooperate with the government access. Access is important for law enforcement, but voyeurism is not a good plan."

"It is time to focus on enhancing private communications," he continues. "The difference is: Where are the keys? If there is a central key service in the Netherlands, then content protected with those keys can only be viewed if access is granted from the Netherlands."

It is important that there is separation between content and keys so a single enterprise does not have the ability to read communications without the customer's knowledge, says Sprague.

Trust has already been lost to marketing on the Web, he adds.

"Everyone knows that Google and Apple are reading everything. [But] there is an opportunity for companies to promote protected content," he says.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Brian Prince is a freelance writer for a number of IT security-focused publications. Prior to becoming a freelance reporter, he worked at eWEEK for five years covering not only security, but also a variety of other subjects in the tech industry. Before that, he worked as a ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
MattL079
50%
50%
MattL079,
User Rank: Apprentice
9/9/2013 | 3:26:08 PM
re: Silent Circle, Lavabit End Secure Email Services Due To Surveillance Concerns
Ok, start to use a real secure email service like: https://www.mail1click.com/

Is quite famous and their servers (encrypted) aren't located in USA.
skswave
50%
50%
skswave,
User Rank: Apprentice
8/13/2013 | 8:57:02 PM
re: Silent Circle, Lavabit End Secure Email Services Due To Surveillance Concerns
It is time to explore and try new models We have put our money where our mouth is and built a service is is free so give it a try. scrambls.com if you open an account you can post on linked in and face book and many other sites encrypted it does not work on dark reading yet. By bracketing text in the @@ symbol everything betweeen is encrypted The key server for a message is in the US and subject to the patriot act and discovery but we are working to build partnerships to license key servers for which Wave will have absolutely no operational role so that discovery will be subject to local laws. scrambls also has strong developer tools at developer.wave.com leveraging @@
Data Leak Week: Billions of Sensitive Files Exposed Online
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/10/2019
Intel Issues Fix for 'Plundervolt' SGX Flaw
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-5252
PUBLISHED: 2019-12-14
There is an improper authentication vulnerability in Huawei smartphones (Y9, Honor 8X, Honor 9 Lite, Honor 9i, Y6 Pro). The applock does not perform a sufficient authentication in a rare condition. Successful exploit could allow the attacker to use the application locked by applock in an instant.
CVE-2019-5235
PUBLISHED: 2019-12-14
Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal.
CVE-2019-5264
PUBLISHED: 2019-12-13
There is an information disclosure vulnerability in certain Huawei smartphones (Mate 10;Mate 10 Pro;Honor V10;Changxiang 7S;P-smart;Changxiang 8 Plus;Y9 2018;Honor 9 Lite;Honor 9i;Mate 9). The software does not properly handle certain information of applications locked by applock in a rare condition...
CVE-2019-5277
PUBLISHED: 2019-12-13
Huawei CloudUSM-EUA V600R006C10;V600R019C00 have an information leak vulnerability. Due to improper configuration, the attacker may cause information leak by successful exploitation.
CVE-2019-5254
PUBLISHED: 2019-12-13
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have an out-of-bounds read vulnerability. An attacker who logs in to the board m...