Signal security

A few days ago there was a murder of a Polish professor in Athens by his wife and her friend. All the media agree that wife and friend used Signal to communicate for their plan. Police break into the security of Signal and arrested them. So far so good about the incident.

But I try to understand… end-to-end encryption is based on a Mathematics theorem which is not false. Signal is considered secure. How the police of a small country (it is not the FBI) breaks into? I do not get this. And why maybe matrix.org could be better in this?

If the encryption is indeed end-to-end not even Signal administrators could break into or help the police. Do they lie about end-to-end? Something else may happen?

1 Like

From this one article, it sounds like the police might have found evidence through forensic analysis of the phone itself (and deleted files):

She allegedly sent the photo via an encrypted message app (Signal) and then deleted it from the cell phone she used, with Greek Police, however, later recovering the image.

2 Likes

The thing to remember about end-to-end encryption of communication is that it is only as secure as the weakest of the two endpoints. If either device is compromised (preferably beforehand but there is still benefit in doing so afterwards) then all the end-to-end encryption in the world will not serve to keep your communication secure.

So the question you also need to ask is: what were the two endpoint devices and are they secure?

Let’s be realistic. For the scenario that you describe, the police will be in possession of the devices. So it is just a question of how resistant to penetration the devices are. I can envisage four penetration scenarios.

  1. Legal force. In some countries the authorities can legally force you to provide access e.g. in my country with an immediate 2 year jail term for non-compliance. You would have to provide the answer for your country.
  2. Torture. OK, let’s rule that out in this particular scenario.
  3. Normal access. Did the device have a PIN / password? Was it a good one?
  4. Other techniques unknown to me e.g. backdoor to device.

If @amarok is correct then there’s not much high tech going on here. The problem that “delete does not really delete” is decades old.

In addition, there is probably a welter of telecommunications metadata available to the police. So they already have some idea of what they are looking for on the device.

Honestly, if it is worth murdering someone, it is worth completely destroying the phone e.g. incineration (taking the concept of a “burner phone” literally). So that no amount of police technology or legal manoeuvres can retrieve anything from the phone. Hint: Murdering someone is a bad idea though. :wink:

As a thought experiment, it is always worth asking the question … how would such an attack go against the Librem 5? I think we know where the bodies are buried (no pun intended) … hence see previous paragraph.

5 Likes

Oh OK, so you say they already had access to the devices. It means they break into the devices and not Signal. That was not reported by the journalists and it sounds logical. Journalists are not to be trusted (at least in Greece).

Thanks for clarifying this.

1 Like

I doubt very much that the police had access to the devices before the murder - because if they did then they would surely have prevented the murder and it would be grossly irresponsible of them not to prevent the murder if it were at all possible.

I’m suggesting that, after the murder, the police seized the devices, and gained access to one or both of the devices (using one of the 4 techniques listed above) and then applied forensics to the devices e.g. in this case finding a recently deleted photo file still recoverable on the phone’s disk.

Just think for a moment about the process of taking a photo. Think how many copies of the photo exist in the phone before you even send it securely. It really doesn’t matter (in this context) whether you send it securely if there are copies of the photo littered all over the phone.

Based on the information in this topic I don’t even know whether the phone was Google or Apple - but I can imagine in the Apple world that Apple could helpfully back the photo up to the Apple Cloud as soon as you take the photo, before you even get to send the photo securely. In that scenario, it doesn’t even matter if you robustly, properly delete the photo from your phone. A copy may still exist in the Apple Cloud, where the Greek police can obtain it via Apple. (I’m not suggesting that that did happen in this particular case, only that it is plausible in the general case.)

Yes. That would be my assumption.

Journalists may be trusted but they are not always good with technological details. They sometimes garble the story. In addition, it is in the interests of the police not to be explicit about their tools and methods, since that may allow better technology to counter their tools and methods. So the combination of intentionally vague police and journalists with limited technological knowledge leads to inaccurate and confusing reporting.

3 Likes

And of course the photo being at the “end” means it was outside the end-to-end loop.

Counting bytes. Does encryption change file size or just scramble it? If the encrypted photo is 974,342 bytes and it matches the unsent photo. Of all the other photos on her phone (deleted or undeleted), aha, that’s the “sent” photo.

1 Like

Not in Greece. They can not be trusted at all.

There is a very old command called “shred” which effectively removes the files from the filesystems (it has a manual (man shred)). But of course this is not available on Android and iOS (I bet).

1 Like

One term related to changing the size would be “padding”. Different encryption algorithms have different methods of padding, so it would depend on the algorithm. Whole disk encryption does not need to pad a file like you’re describing, since the entire drive is unreadable, but the encryption that Tor uses, for example, will do some padding when sending an HTTP request, to help protect against static analysis, where an attacker might try to match requests coming into and going out of the Tor network based on number of bytes, exactly as you are describing.

2 Likes

Thanks. I suppose then the next question is: “Does Signal do that?”

1 Like

Metadata is king in forensics of encrypted traffic.

2 Likes

Metadata is very revealing, for sure.

Cellebrite can suck out almost everything from the device, though: texts, emails, photos, videos, files, contacts, logs, installed applications, etc.

With the possible exception of encrypted files, as long as the keys are not exposed.

3 Likes

Do not trust shred in today’s modern systems. If you look, even the man pages lists caveats, main ones being journaling file systems (like ext), flash memory (non-harddisk memory, so anything in phones) and if systems make automatic backups to cloud. The main protection to data is that you have an encrypted drive so that if it is locked, all files (deleted or not) are unusable (caveat is of course if there is weak login for decryption). Even overwriting a flash or solid memory type device (memory chips) can skip corners due to how the memory handles itself (it helps, but if it wasn’t encrypted to-begin-with, you can’t be sure). There are good up to date sites that go step by step on what to do with modern memory (note: a hammer or drill may be a valid option, fire too as irwine suggested) but shred hasn’t been secure for decades now.

2 Likes

This is a complex question and the answer is definitely “it depends”, since no specific encryption algorithm or protocol is mentioned.

The short answer would be: Yes, the file size changes. The file generally gets bigger during encrypted transmission.

So it is not possible to do an exact match between file length in order to assert that a file on disk of length N that was seen to be transmitted as N bytes therefore it is overwhelmingly likely that that file is the one that was transmitted.

In other words

No.

However just from the sheer size of the transferred file, it will generally be plausible to assert that the file sent over Signal was not a text file and not just a text message.

Some of the reasons that size changes during secure transmission:

  • Establishment of a secure connection involves handshake / negotiation in order to get the sender and receiver ready to talk to each other. That means that there is a more or less fixed overhead at the beginning (regardless of the size of the file).
  • If doing both compression and encryption, it is essential to compress before encryption. Hence some encryption algorithms will offer optional compression as an added bonus. This in a small way may offset some of the overheads of secure transmission. (However, for example, a JPEG image is already compressed and therefore won’t compress much.)
  • Some encryption algorithms require fixed size blocks to work on. Hence the payload may get padded up to the next multiple of the block size.
  • Protocols may have fixed overhead on each packet. Just as both IP and TCP themselves do, so does, for example, TLS. So by definition you always transmit a small amount more than the underlying payload data.
  • If a protocol offers integrity (i.e. the detection of packets that are altered in transit) then this will typically involve transmitting some kind of extra value (a MAC/HMAC or a MIC, before or after encryption depending on protocol) that allows the receiver to verify that good data is being received i.e. a souped-up checksum.
2 Likes

This is true - for all the reasons that you list - but you still may be better off using shred than not using shred.

Some solid state storage may offer genuine secure erase. However there is a fundamental problem that the secure erase operation is opaque i.e. there is blackbox code running inside the storage (i.e. the firmware of the storage device itself) and the “secure erase” could be a no-operation (pure theatre) or completely functional, or anything in between, and you have no way of knowing what is the case.

Or that the encryption passphrase is “extracted” out of you.

1 Like

Would extracting passphrases from you be like this interrogation? From one of Cheech & Chong’s albums (there are various versions and other venues):

Old Man: I vill not sign zee papers.

[Sounds of Old Man being beaten]

German: Sign zee papers!

Old Man: Vat do zee papers say?

German: Zey are merely a statement zat you haff not been mistreated vhile you haff been here.

Old Man: I cannot sign zee papers.

German: Und vhy cannot you sign zee papers?

Old Man: Because you haff broken both of my hands!

2 Likes

Its secure, but not as you think. You have to trust the Devices the Apps and the AI on your and the Senders device. And if They share or Store Pictures with others without signal on some social chats or devices its highly liked to got public.

If you have to be private. Meet each other without Smartphones. And use pen and paper.

Even Brains and memories are got digitalize in our present.

1 Like

There is a lot of truth in that but don’t forget the ubiquitous surveillance cameras.

1 Like