Encrypted chat app CryptoCat isn’t secure by any means

TECHi's Author Jesseb Shiloh
Opposing Author Dailydot Read Source Article
Last Updated Originally published April 5, 2014 · 5:20 AM EDT
Dailydot View all Dailydot Two Takes by TECHi Read the original story Published April 5, 2014 Updated April 4, 2014
TECHi's Take
Jesseb Shiloh
Jesseb Shiloh
  • Words 77
  • Estimated Read 1 min

People in the security community often criticize the code behind Cryptocat, an open-source encrypted instant messaging project. Ironically, Cryptocat’s policy of publicly releasing third-party code audits is what generates much of the criticism, which is a reason other projects often choose not to release their audits. On Wednesday, Cryptocat’s founder, Nadim Kobeissi, announced the release of two more code audits, both of which found flaws with the chat program that have now been mostly resolved.

Dailydot

Dailydot

  • Words 133
  • Estimated Read 1 min
Read Article

A new report has called into question the effectiveness of cryptographic protocols utilized by the popular browser- and iOS-based chat application CryptoCat. The open-source app contains several flaws, which may permit attackers to compromise OTR (off-the-record) conversations, according iSEC Partners researchers, who performed penetration tests on the software. Users are provided an encrypted platform for conversation through the use of forward secrecy, which in the case of CryptoCat relies upon newly generated keys for each chat session. The process used by the app places the responsibility of verifying a peer’s identity squarely on the users themselves. In other words, a user would need to verify the identity of the person with whom they wish to speak by other secured means prior to initiating CryptoCat, thus negating the entire purpose of the app.

Source

NOTE: TECHi Two-Takes are the stories we have chosen from the web along with a little bit of our opinion in a paragraph. Please check the original story in the Source Button below.

Balanced Perspective

TECHi weighs both sides before reaching a conclusion.

TECHi’s editorial take above outlines the reasoning that supports this position.

More Two Takes from Dailydot

France considers restricting public Wi-Fi and Tor to combat terrorism
France considers restricting public Wi-Fi and Tor to combat terrorism

Often more frightening than terrorist attacks themselves are the asinine laws that politicians will propose in their wake. When the horrors…

China is now arresting hackers at the request of the United States
China is now arresting hackers at the request of the United States

China and the United States reached some important agreements and understandings regarding cybersecurity last month, but a lot of people…

YouTube Live will be taking on Twitch later this year
YouTube Live will be taking on Twitch later this year

There was a time last year when everyone was certain that Google was going to acquire Twitch, the undisputed king…

Apple knew about iCloud’s vulnerabilities well before the attack
Apple knew about iCloud’s vulnerabilities well before the attack

In a recent interview with Charlie Rose on PBS, Apple CEO Tim Cook said that the iCloud breach that leaked…