Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

8/13/2013
01:06 PM
50%
50%

Silent Circle, Lavabit End Secure Email Services Due To Surveillance Concerns

Concerns about government surveillance could trigger mixed reactions among vendors in the market

The fallout from the controversy regarding the NSA's electronic surveillance programs has caused a firm providing encrypted email services to shutter its doors.

Silent Circle, which offers encryption services designed to shield everything from text messages to phone calls, says the decision to end its Silent Mail service reflects concerns regarding increased surveillance targeting users. With the move, it joins a company called Lavabit that suspended its operations last week, as well, due to concerns about government surveillance on the Internet.

The moves by the companies are the result of the ongoing ripples from the wave of controversy surrounding recent disclosures about NSA programs -- ripples that some predict could affect the secure messaging market in different ways.

"The thing to note about Silent Circle is that they are a niche cloud provider," says Paige Leidig, senior vice president at CipherCloud. "While they chose to shut down, the larger cloud provider titans, including likes Google and Microsoft, have a history of transparency reports that indicate they do not blindly comply with information requests. They also have the resources to mount a legal challenge which may not be an option for much smaller companies."

In a statement, Silent Circle chief technology officer Jon Callas said that Silent Mail was introduced because email was "fundamentally broken from a privacy perspective."

Silent Circle continues to offer other services that encrypt text messages and VoIP communications. The company says it does not log any metadata associated with these services and does not have the ability to decipher the content of calls and messages.

"With further thought -- and before we were served with any demands compounding this issue -- we decided it is in our users’ best interests to focus purely on peer-to-peer encrypted phone, text and videoconferencing services because the less information we have on how subscribers use our services, the better it is for everyone," Callas says.

"This is an unfortunate example of the chilling effect the current surveillance environment is having on innovative communications companies," he added. "While the majority of our government, commercial and consumer subscribers primarily use the unaffected apps that run on our peer-to-peer encrypted architecture -- like Silent Phone and Silent Text -- we apologize for any inconvenience this decision caused."

In a blog post, Lavabit owner Ladar Levison lamented being unable to share the exact circumstances that prompted his decision, but wrote that the decision was made after considerable "soul searching."

"This experience has taught me one very important lesson: without congressional action or a strong judicial precedent, I would _strongly_ recommend against anyone trusting their private data to a company with physical ties to the United States," he wrote.

Elsewhere in the industry, offered mixed predictions about how the mood of Web users and organizations will impact both the security market and trust on the Internet.

"The industry is full of visionaries and entrepreneurs who find inspiration in the marketplace to make the next generation of tools that businesses and consumers desire," Leidig said. "Judging from the significant jump in our prospect inquiries, many companies using cloud applications were rattled by the extent of the surveillance programs."

Steven Sprague, CEO of Wave Systems, says that instead of dropping services, a new market may open for protecting private communications on semi-public networks by using key servers located in different countries. This will ensure that government access to keys is dependent on the sovereign control of the country where the key server is, he explains.

"The challenge will be to establish the rules and notifications around these keys," he says. "I would also suggest that the challenge is to separate the messages and the keys requiring the companies to cooperate with the government access. Access is important for law enforcement, but voyeurism is not a good plan."

"It is time to focus on enhancing private communications," he continues. "The difference is: Where are the keys? If there is a central key service in the Netherlands, then content protected with those keys can only be viewed if access is granted from the Netherlands."

It is important that there is separation between content and keys so a single enterprise does not have the ability to read communications without the customer's knowledge, says Sprague.

Trust has already been lost to marketing on the Web, he adds.

"Everyone knows that Google and Apple are reading everything. [But] there is an opportunity for companies to promote protected content," he says.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Brian Prince is a freelance writer for a number of IT security-focused publications. Prior to becoming a freelance reporter, he worked at eWEEK for five years covering not only security, but also a variety of other subjects in the tech industry. Before that, he worked as a ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
MattL079
50%
50%
MattL079,
User Rank: Apprentice
9/9/2013 | 3:26:08 PM
re: Silent Circle, Lavabit End Secure Email Services Due To Surveillance Concerns
Ok, start to use a real secure email service like: https://www.mail1click.com/

Is quite famous and their servers (encrypted) aren't located in USA.
skswave
50%
50%
skswave,
User Rank: Apprentice
8/13/2013 | 8:57:02 PM
re: Silent Circle, Lavabit End Secure Email Services Due To Surveillance Concerns
It is time to explore and try new models We have put our money where our mouth is and built a service is is free so give it a try. scrambls.com if you open an account you can post on linked in and face book and many other sites encrypted it does not work on dark reading yet. By bracketing text in the @@ symbol everything betweeen is encrypted The key server for a message is in the US and subject to the patriot act and discovery but we are working to build partnerships to license key servers for which Wave will have absolutely no operational role so that discovery will be subject to local laws. scrambls also has strong developer tools at developer.wave.com leveraging @@
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/25/2020
Hacking Yourself: Marie Moe and Pacemaker Security
Gary McGraw Ph.D., Co-founder Berryville Institute of Machine Learning,  9/21/2020
Startup Aims to Map and Track All the IT and Security Things
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15208
PUBLISHED: 2020-09-25
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, when determining the common dimension size of two tensors, TFLite uses a `DCHECK` which is no-op outside of debug compilation modes. Since the function always returns the dimension of the first tensor, malicious attackers can ...
CVE-2020-15209
PUBLISHED: 2020-09-25
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, a crafted TFLite model can force a node to have as input a tensor backed by a `nullptr` buffer. This can be achieved by changing a buffer index in the flatbuffer serialization to convert a read-only tensor to a read-write one....
CVE-2020-15210
PUBLISHED: 2020-09-25
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, if a TFLite saved model uses the same tensor as both input and output of an operator, then, depending on the operator, we can observe a segmentation fault or just memory corruption. We have patched the issue in d58c96946b and ...
CVE-2020-15211
PUBLISHED: 2020-09-25
In TensorFlow Lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, saved models in the flatbuffer format use a double indexing scheme: a model has a set of subgraphs, each subgraph has a set of operators and each operator has a set of input/output tensors. The flatbuffer format uses indices f...
CVE-2020-15212
PUBLISHED: 2020-09-25
In TensorFlow Lite before versions 2.2.1 and 2.3.1, models using segment sum can trigger writes outside of bounds of heap allocated buffers by inserting negative elements in the segment ids tensor. Users having access to `segment_ids_data` can alter `output_index` and then write to outside of `outpu...