Steve Bellovin on Nostr: The NSA understands how to design phones that are not just cryptographically ...
The NSA understands how to design phones that are not just cryptographically secure—Signal probably is—but also have other important properties. See, e.g., p 570 of
https://cr.yp.to/bib/1988/diffie.pdf: “each phone shows information about the identity and clearance of the other party on its display”. That information is apparently embedded in certificates possessed by each user. (Conferencing is a separate problem but one that can also have such properties.) Signal doesn't do that. Instead, you're supposed to assess the identity of your contacts out of band—somehow!—and trust that. And yes, you can have STU-III users who have no clearance—I heard a story from a very reliable source about someone who had such a phone and certificate, and used it to call my contact. (I actually know both people in this call, and I'm quite willing to believe that the other party had such a certificate—it's quite in keeping with their personality.)
Individuals setting up random groups from their own contact list is beyond reckless—it's incompetent and arguably criminal, as the article points out. (Btw, you're not allowed to bring personal cell phones into a SCIF—you leave your phone in your car or put it in a locker outside the SCIF.)
Published at
2025-03-24 17:55:36Event JSON
{
"id": "993e8c41dc88cc7d1091cbf703022565fd2d7c555d43d24a56a175a75c4fa69c",
"pubkey": "1ace68472745b2642934c6172c5994f5f094f01deb752145d25225e637a87a50",
"created_at": 1742838936,
"kind": 1,
"tags": [
[
"proxy",
"https://infosec.exchange/users/SteveBellovin/statuses/114218692574308558",
"activitypub"
]
],
"content": "The NSA understands how to design phones that are not just cryptographically secure—Signal probably is—but also have other important properties. See, e.g., p 570 of https://cr.yp.to/bib/1988/diffie.pdf: “each phone shows information about the identity and clearance of the other party on its display”. That information is apparently embedded in certificates possessed by each user. (Conferencing is a separate problem but one that can also have such properties.) Signal doesn't do that. Instead, you're supposed to assess the identity of your contacts out of band—somehow!—and trust that. And yes, you can have STU-III users who have no clearance—I heard a story from a very reliable source about someone who had such a phone and certificate, and used it to call my contact. (I actually know both people in this call, and I'm quite willing to believe that the other party had such a certificate—it's quite in keeping with their personality.)\nIndividuals setting up random groups from their own contact list is beyond reckless—it's incompetent and arguably criminal, as the article points out. (Btw, you're not allowed to bring personal cell phones into a SCIF—you leave your phone in your car or put it in a locker outside the SCIF.)",
"sig": "535fb5095b44fa7cff4a23ea9e7cbcc3b88310112ddf3b16b2c7bf1003c824c76b151f5f668d239b100f12b702121ce02aecbe1ae3c5251f415d8315e863dc80"
}