The NSA Uses the Same Chat Protocol As Hackers 81
rossgneumann writes NSA documents obtained by Edward Snowden and reported on by Der Spiegel on Sunday reveal that the agency communicates internally with Jabber, an open source messaging service used by hackers and activists trying to skirt the NSA's internet surveillance dragnet. A document outlining the NSA's Scarletfever program—a "message driven cryptologic exploitation service" designed as part of the larger Longhaul initiative, a program that collects data and finds ways to break its encryption—contains a curious point buried near the end: "Jabber Chat Room: TBD."
OMG Jabber (Score:5, Funny)
Re: (Score:1)
Re: OMG Jabber (Score:2)
Yeah, rebellious stuff sold by upstarts like Cisco [cisco.com]. Good chance they have done unified communications from Cisco that comes with jabber on the desktops.
Re: (Score:2)
Google Talk / Hangouts are also XMPP based as well, although they have pretty much closed it off to all outside clients.
Re: (Score:2)
talk yes, hangouts no.
stupidest. revelation. ever. (Score:5, Insightful)
i bet those sons of bitches are using imap and ethernet too! just like hackers!
Re:stupidest. revelation. ever. (Score:5, Funny)
Re:stupidest. revelation. ever. (Score:4, Informative)
Do your part (Score:3, Interesting)
An AC in a previous Snowden story posted this link:
Grant Snowden Clemency [aclu.org]
You can sign this petition to pressure the government to pardon Snowden, so he can come back to the states a free man.
Please share this link on your other forums. It is the least you can do for him, after all he has sacrificed for you.
Re:Do your part (Score:4, Insightful)
It will be as successful as the "legalize marijuana" petition.
Is that really the example you want to use? Is the answer, "fairly successful"?
23 states and District of Columbia currently have laws legalizing marijuana in some form.
4 states have legalized it for recreational use (6 in 2015).
Many states have eliminated or greatly reduced penalties for small amounts of it.
Population-wise, and electoral-college-wise, I believe we are well past 50%.
Re: (Score:2)
The legalize marijuana petition on change.org had less than nothing to do with any of that, as it was roundly ignored by the administration just as we all knew it would be even though they'd promised to listen to us, because all the important campaign promises were empty, so why not that one? Just like the old boss, the old boss +1, ad infinitum.
And so you do nothing? (Score:2)
This petition is hosted by Snowden's legal advisers, who happen to be a political lobby with real economic assets. So, it bears a little more weight than the average Internet petition.
Re: (Score:2)
It will be as successful as the "legalize marijuana" petition.
Well it seems to have worked out just fine where I live here in Washington state and in Colorado also.
Re: (Score:2)
Post hoc ergo propter hoc
Re: (Score:3)
Post hoc ergo propter hoc
No if it were not for petitions we would not had the initiative put on the ballot where it succeeded, therefor it is not "Post hoc ergo propter hoc" as you say but simple cause and effect.
QED bitches -xkcd
Re: (Score:2, Funny)
And slashdot has sunk to new lows in terms of article quality.
And despite that, I bet they still haven't reached their full downward potential.
FTFY (Score:1)
sunk
Re:stupidest. revelation. ever. (Score:5, Interesting)
There's a whole lot of comments here saying this is stupid, obvious, not surprising, etc, and pointing out other clients that have used (and still use) XMPP (jabber).
The one potentially interesting bit that brought me here... what are they using for encryption?
I'm assuming they have TLS enabled from client to server, and from server to server. The details for that layer are not very important to me, though I'd still be interested to know.
The end-to-end encryption used, that's what I'd be most curious to hear about. There's a lot of apps and plugins and such that boast end-to-end encryption, but there is little interoperability AFAICT. There's a fairly wide variety of implementations and specs (and lack thereof). OTR may be the best known one (http://en.wikipedia.org/wiki/Off-the-Record_Messaging). IMO, what it uses seems somewhat dated with respect to all the SSL/TLS issues that came to light this past year. Ex, OTR uses:
* Diffie-Hellman key exchange with 1536 bit group size. (is this ADH, static DH, DHE, ECDH, ECDHE, etc)
* AES symmetric key with 128 bit key length (AES 256 is more the norm now, and there are certainly lots of other alternatives)
* SHA-1 hash function (SHA1 is deprecated in many situations, and SHA256 and other stronger hash functions are readily available)
* forward secrecy (that's good... but I wonder if it's using similar and well tested methods such as used in current PFS TLS implementations)
* NO support for multi-user group chat
I'm betting there's better and/or more updated things out there. Seems OTR could be updated fairly easily (define new protocol version and use different set of stuff in the various places in the protocol), but what is it that others that are extremely paranoid are using?
Re: (Score:3)
OTR is mentioned as one of those things they really can't crack if you dig through the whole Spiegel article.
They are run by political appointees and friends (Score:2)
After the star trek set designer getting called in the only way to go is down. The Chinese or whoever would have just needed some way to pander to a huge ego to get a backdoor into the place.
Re: (Score:2)
The paranoid are using one-time-pads...
Thank you for this but:
a) if they're using that for real time chat, that's not the complete solution. How does it all tie together?
b) if they're not using it for real time chat, then that doesn't answer the question really.
Even for simple status updates and such, "OTP on a microSD" is still not a complete answer. If I had my OTP stored anywhere, then it'd also be encrypted. Then there's the matter of how to decrypt the OTP wherever one happens to be. All very solvable, but a detailed doc of all the parts an
Re: stupidest. revelation. ever. (Score:2)
It may not be end-to-end : one of the ways the sixteen intelligence agencies handle security is through the use of xml-bridges. Payloads are rewritten between networks of different classifications - only data gets across, not even binary documents. XMPP is useful for more than just chat clients. source: chatty dude at a tradeshow booth a few years back (niche market). This is one of the ways corporate actors fail to grok security - they accept the bets of COTS even if it's not good enough. TLA's hire
Re: (Score:2)
This is damage control. What the docs show, is that OTR encryption is safe. You can use OTR encryption with Jabber, but Jabber isn't encrypted by default.
What they presumably hope is that people will use Jabber and think they're safe. And Slashdot editors are being the useful idiots as usual.
Re: (Score:2)
It's likely to be something which they can read easily, so not OTR.
SIGINT dudes are not just keen on encryption. They are keen on reading communications too. To this end they usually advocate systems with key escrow at the very least, because they want to be able to keep tabs on their agents and analysts.
I saw a brief prepared for the UK National Health Service by GCHQ on data security, it heavily emphasised key escrow, which reveals the bias of the agency that produced it. A crypto brief prepared by doctor
Re: (Score:2)
Re: (Score:2)
Dumb (Score:5, Insightful)
Wow, that article said absolutely nothing interesting.
The gist: jabber is a widely used protocol, there is a widely used way to encrypt it,and the NSA has played around with it.
Also what is the deal with every website now using this weird scrolling hackery. I find it very unpleasant.
Re: (Score:3)
...properly participating in the two minutes of hate.
I'm guessing that the irony eludes you.
As 'Hackers'? (Score:1, Insightful)
Is this like nerd, where everyone is calling themselves that?
Because XMPP (Jabber prior to it's adoption as a standard) is/has been used by google, plus about a hundred other chat services, including Kik (albeit a proprietary derivative, seems to be what all the kids are using nowadays).
So really it's less a story of NSA using the same service as hackers and more 'Whoa! NSA uses the same chat protocols as *EVERYONE ELSE DOES*"
What a non-story.
Re: (Score:2)
I'll bet that's not all... (Score:5, Funny)
They probably use the same email system hackers do!
In other news... (Score:3, Funny)
Re: (Score:3, Informative)
in fascist USA NSA poops on you
Re: (Score:1)
You can't prove you have standing not to be pooped on, says 5 assholes out of 9.
Jabber (Score:2)
So does Google Talk and Facebook Messenger and countless other chat systems. Way to go article. Next you'll be telling us that the NSA uses the same operating systems as hackers (OMG LINUXESSES N SHIT)
Re: (Score:3, Funny)
Not at all senationalist headline (Score:2)
I'll bet the NSA uses Linux, too. Isn't that the hacking OS that uses text on a black screen?
And FTP, that's how the hackers move their files around. I'll bet NSA uses that too.
OS that uses text on a black screen (Score:2)
Isn't [Linux] the hacking OS that uses text on a black screen?
I'm sorry. You must have Linux [xfce.org] confused with Windows Server Core [microsoft.com].
Keyboards also used by hackers & NSA (Score:4, Funny)
Both the NSA and Hackers are using Keyboards to input data into computers.
Seriously, Jabber/XMPP are well known standards [rfc-editor.org] for implementing internet messaging.
This whole article smells like misinformation to work the media up into a frenzy. I don't see how these revelations can accomplish anything positive.
Re: (Score:3)
This whole article smells like misinformation to work the media up into a frenzy. I don't see how these revelations can accomplish anything positive.
Most people can't distinguish between Jabber and Metadata. Expecting people to come to reasonable conclusions, and be outraged about the proper things when dealing with computer related issues, is asking too much.
Reporters don't care, they are looking for something sensationalistic to bring in eyeballs. They aren't really journalists, they're eyeball-mongers.
The important thing is that people realize the NSA is spying on them, and presumably that would outrage them, but somehow it seems to not. I don'
Re: (Score:2)
The important thing is that people realize the NSA is spying on them, and presumably that would outrage them, but somehow it seems to not. I don't know why.
Obviously the NSA is protecting us for terrorists.
"NSA using same technologies as hackers!" (Score:4, Funny)
“Shocking revelations have come out today that the NSA is using the same kind of computers and Internet technologies as hackers, criminals and even paedophiles! The NSA are known to use PCs and operating systems such as Microsoft Windows - a paeophiles favourite - and even Linux - beloved by hackers. The NSA even has spent money on making Linux more secure, which may help thwart law enforcement from investigating computers used by criminals. Further reports suggest the NSA also regularly use TCP in a variety of ways. TCP is known to be heavily deployed by many criminals worldwide. We contacted the NSA and asked them to comment, but their spokesperson responded only with a sneering "Oh for fucks sake" before hanging up the phone.”
Slow News Day? (Score:2)
This is also not new. (Score:1)
I submit the Anonymous Coward's hypothesis:
Every single Slashdot article has at least one post asking if today is a slow news day.
Please attempt to disprove.
Dawwww! (Score:2)
Stay Tuned... (Score:1)
Wow. People use Jabber? Yes, people use Jabber. (Score:2)
Wow. People use Jabber? Yes, people use Jabber.
This is not news, not now, not ever. Jabber and XMPP is a real thing, much more real than IRC. Please move along and report something worthwhile, folks.
Apache Wave (Score:1)