Jump to content

TextSecure

From Wikipedia, the free encyclopedia
TextSecure
Original author(s)Moxie Marlinspike
and Stuart Anderson
(Whisper Systems)
Developer(s)Open Whisper Systemsand community
Initial releaseMay 25, 2010(2010-05-25)[1]
Final release
2.28.1
(September 29, 2015;9 years ago(2015-09-29))[2]
Repository
Written inJava(client and server)
Operating systemAndroid
Successormerged with RedPhone to becomeSignal[3]
Size11 MB
Available in34 languages[4]
TypeEncryptedinstant messaging
LicenseGPLv3(client),[5]
AGPLv3(server)[6]
Websitewhispersystems.org

TextSecurewas an encrypted messaging application forAndroidthat was developed from 2010 to 2015. It was a predecessor toSignaland the first application to use theSignal Protocol,which has since been implemented intoWhatsAppand other applications. TextSecure usedend-to-end encryptionto secure the transmission of text messages, group messages, attachments and media messages to other TextSecure users.

TextSecure was first developed byWhisper Systems,who were lateracqui-hiredbyTwitter.The application'ssource codewas then released under afree and open-source softwarelicense. In 2013, TextSecure's development was picked up by an independent group calledOpen Whisper Systems,who merged it with an encrypted voice calling application calledRedPhoneand renamed the product as Signal.

History

[edit]
TextSecure's icon from May 2010 to February 2014 and from February 2014 to February 2015.

Whisper Systems and Twitter (2010–2011)

[edit]

TextSecure started as an application for sending and receiving encrypted SMS messages.[7]Itsbeta versionwas first launched on May 25, 2010, byWhisper Systems,[1]a startup company co-founded by security researcherMoxie Marlinspikeand roboticist Stuart Anderson.[8][9]In addition to launching TextSecure, Whisper Systems produced a firewall, tools for encrypting other forms of data, andRedPhone,an application that provided encrypted voice calls.[1][8]All of these wereproprietaryenterprise mobile security software.

In November 2011, Whisper Systems announced that it had been acquired byTwitter.The financial terms of the deal were not disclosed by either company.[10]The acquisition was done "primarily so that Mr. Marlinspike could help the then-startup improve its security".[11]Shortly after the acquisition, Whisper Systems' RedPhone service was made unavailable.[12]Some criticized the removal, arguing that the software was "specifically targeted [to help] people under repressive regimes" and that it left people like the Egyptians in "a dangerous position" during the events of the2011 Egyptian revolution.[13]

Twitter released TextSecure asfree and open-source softwareunder theGPLv3license in December 2011.[8][14][15][16]RedPhone was also released under the same license in July 2012.[17]Marlinspike later left Twitter and foundedOpen Whisper Systemsas a collaborative Open Source project for the continued development of TextSecure and RedPhone.[18][19]

Open Whisper Systems (2013–2015)

[edit]
A timeline of the development of TextSecure.
a) Addition of encrypted group chat and instant messaging capabilities.
b) End of encrypted SMS/MMS messaging, which prompted the creation of a fork.
c) RedPhone merged into TextSecure and it was renamed as Signal.
d) Signal as a RedPhone counterpart for iOS.
e) Addition of encrypted group chat and instant messaging capabilities on iOS.

Open Whisper Systems' website was launched in January 2013.[19]Open Whisper Systems started working to bring TextSecure toiOSin March 2013.[20][21]

In February 2014, Open Whisper Systems introduced the second version of their TextSecure Protocol (nowSignal Protocol), which added group chat and push messaging capabilities to TextSecure.[20][22]Toward the end of July 2014, Open Whisper Systems announced plans to unify its RedPhone and TextSecure applications asSignal.[23]This announcement coincided with the initial release of Signal as a RedPhone counterpart for iOS. The developers said that their next steps would be to provide TextSecure instant messaging capabilities for iOS, unify the RedPhone and TextSecure applications on Android, and launch a web client.[24]Signal was the first iOS app to enable easy, strongly encrypted voice calls for free.[18][25]

TextSecure compatibility was added to the iOS application in March 2015.[26][27]Later that month, Open Whisper Systems ended support for sending and receiving encrypted SMS/MMS messages on Android. From version 2.7.0 onward, TextSecure only supported sending and receiving encrypted messages via the data channel. Reasons for this included:[7]

  • Complications with the SMS encryption procedure: Users needed to manually initiate a "key exchange", which required a full round trip before any messages could be exchanged. In addition to this, users could not always be sure whether the receiver could receive encrypted SMS/MMS messages or not.
  • Compatibility issues with iOS: Not possible to send or receive encrypted SMS/MMS messages on iOS due to the lack ofAPIs.
  • The large amounts ofmetadatathat inevitably arise and are uncontrollable when using SMS/MMS for the transportation of messages.
  • Focus on software development: Maintaining SMS/MMS encryption and dealing with edge cases took up valuable resources and inhibited the development of the software.

Open Whisper Systems' abandonment of SMS/MMS encryption prompted some users to create aforknamed Silence (initially called SMSSecure[28]) that is meant solely for the encryption of SMS and MMS messages.[29][30]

In November 2015, the RedPhone application was merged into TextSecure and it was renamed asSignal for Android.[3]

Features

[edit]
The application preventedscreenshotsof conversations by default. Its intention was to prevent other applications from taking screenshots.[31]

TextSecure allowed users to send encrypted text messages, audio messages, photos, videos, contact information, and a wide selection ofemoticonsover a data connection (e.g.Wi-Fi,3Gor4G) to other TextSecure users withsmartphonesrunning Android. TextSecure also allowed users to exchange unencrypted SMS and MMS messages with people who did not have TextSecure.[22]

Messages sent with TextSecure to other TextSecure users were automatically end-to-end encrypted, which meant that they could only be read by the intended recipients. Thekeysthat were used to encrypt the user's messages were stored on the device alone. In the user interface, encrypted messages were denoted by a lock icon.

TextSecure allowed the user to set a passphrase that encrypted the local message database and the user's encryption keys.[32]This did not encrypt the user's contact database or message timestamps.[32]The user could define a time period after which the application "forgot" the passphrase, providing an additional protection mechanism in case the phone was lost or stolen.[31]

TextSecure had a built-in function for verifying that the user was communicating with the right person and that noman-in-the-middle attackhad occurred. This verification could be done by comparing key fingerprints (in the form ofQR codes) in person.[31]The application would also notify the user if the correspondent's key fingerprint had changed.[31]

TextSecure allowed users to chat with more than one person at a time.[33]Group chats were automatically end-to-end encrypted and held over an available data connection if all participants were registered TextSecure users. Users could create groups with a title and avatar icon, add their friends, join or leave groups, and exchange messages/media, all with the same encryption properties pairwise TextSecure chats provided. The servers did not have access to group metadata such as lists of group members, the group title, or the group avatar icon.[22][34]

The application could also function as a drop-in replacement for Android's native messaging application as it could fall back to sending unencrypted SMS and MMS messages.

Limitations

[edit]

TextSecure required that the user had a phone number for verification.[35]The number did not have to be the same as on the device's SIM card; it could also be a VoIP number[35]or a landline as long as the user could receive the verification code and have a separate device to set-up the software. A number could only be registered to one device at a time.

The official TextSecure client requiredGoogle Play Servicesbecause the app was dependent on Google'sGCMpush messaging framework.[36]From February 2014 to March 2015, TextSecure used GCM as the transport for message delivery over the data channel. From March 2015 forward, TextSecure's message delivery was done by Open Whisper Systems themselves and the client relied on GCM only for a wakeup event.[7]

Architecture

[edit]

Encryption protocol

[edit]

TextSecure was the first application to use the Signal Protocol (then called the TextSecure Protocol), which has since been implemented intoWhatsApp,Facebook Messenger,andGoogle Allo,encrypting the conversations of "more than a billion people worldwide".[37]The protocol combines theDouble Ratchet Algorithm,prekeys, and a 3-DH handshake.[38]It usesCurve25519,AES-256,andHMAC-SHA256asprimitives.[39]

The protocol provides confidentiality, integrity, authentication, participant consistency, destination validation,forward secrecy,backward secrecy (aka future secrecy), causality preservation, message unlinkability, message repudiation, participation repudiation, andasynchronicity.[40]It does not provide anonymity preservation, and requires servers for the relaying of messages and storing of public key material.[40]

The group chat protocol is a combination of a pairwise double ratchet andmulticast encryption.[40]In addition to the properties provided by the one-to-one protocol, the group chat protocol provides speaker consistency, out-of-order resilience, dropped message resilience, computational equality, trust equality, subgroup messaging, as well as contractible and expandable membership.[40]

Servers

[edit]

All client-server communications were protected byTLS.[41]Once the server removed this layer of encryption, each message contained either the phone number of the sender or the receiver in plaintext.[42]This metadata could in theory have allowed the creation of "a detailed overview on when and with whom users communicated".[42]Open Whisper Systems asserted that their servers did not keep this metadata.

In order to determine which contacts were also TextSecure users,cryptographic hashesof the user's contact numbers were periodically transmitted to the server.[43]The server then checked to see if those matched any of the SHA256 hashes of registered users and told the client if any matches were found.[43]Moxie Marlinspike wrote that it is easy to calculate a map of all possible hash inputs to hash outputs and reverse the mapping because of the limitedpreimagespace (the set of all possible hash inputs) of phone numbers, and that "practical privacy preserving contact discovery remains an unsolved problem".[42][43]

The group messaging mechanism was designed so that the servers did not have access to the membership list, group title, or group icon.[44]Instead, the creation, updating, joining, and leaving of groups was done by the clients, which delivered pairwise messages to the participants in the same way that one-to-one messages were delivered.[22][34]

The server architecture was partially decentralized between December 2013 and February 2016. In December 2013, it was announced that the messaging protocol that was used by TextSecure had successfully been integrated into the Android-based open-source operating systemCyanogenMod.[45][46][47]From CyanogenMod 11.0 onward, the client logic was contained in a system app called WhisperPush. According to Open Whisper Systems, the Cyanogen team ran their own TextSecure server for WhisperPush clients, whichfederatedwith Open Whisper Systems' TextSecure server, so that both clients could exchange messages with each-other seamlessly.[47]The CyanogenMod team discontinued WhisperPush in February 2016, and recommended that its users switch to Signal.[48]

Licensing

[edit]

The completesource codeof TextSecure was available onGitHubunder afree software license.[5]The software that handled message routing for the TextSecure data channel was also open source.[6]

Distribution

[edit]

TextSecure was officially distributed only throughGoogle Play.In October 2015, TextSecure had been installed over 1 000 000 times through Google Play.[2]

TextSecure was briefly included in theF-Droidsoftware repository in 2012, but was removed at the developer's request because it was an unverified build and exceptionally out of date. Open Whisper Systems have subsequently said that they will not support their applications being distributed through F-Droid because it does not provide timely software updates, relies on a centralized trust model and necessitates allowing the installation of apps from unknown sources which harms Android's security for average users.[36]

Audits

[edit]

In October 2013, iSEC Partners published a blog post in which they said that they had audited several of the projects supported by theOpen Technology Fundover the past year, including TextSecure.[49]

In October 2014, researchers fromRuhr University Bochumpublished an analysis of the TextSecure encryption protocol.[39]Among other findings, they presented anunknown key-share attackon the protocol, but in general, they found that the encrypted chat client was secure.[50]

Reception

[edit]

FormerNSAcontractorEdward Snowdenendorsed TextSecure on multiple occasions. In his keynote speech atSXSWin March 2014, he praised TextSecure for its ease-of-use.[51][52]During an interview withThe New Yorkerin October 2014, he recommended using "anything from Moxie Marlinspike and Open Whisper Systems".[53]Asked about encrypted messaging apps during aRedditAMA in May 2015, he recommended TextSecure.[54][55]

In October 2014, theElectronic Frontier Foundation(EFF) included TextSecure in their updated Surveillance Self-Defense guide.[56]In November 2014, TextSecure received a perfect score on the EFF's Secure Messaging Scorecard.[57][58]TextSecure received points for having communications encrypted in transit, having communications encrypted with keys the providers don't have access to (end-to-end encryption), making it possible for users to independently verify their correspondent's identities, having past communications secure if the keys are stolen (forward secrecy), having their code open to independent review (open-source), having their security designs well-documented, and having recent independent security audits.[57]At the time, "ChatSecure+Orbot",Cryptocat,"Signal / RedPhone",Pidgin(withOTR),Silent Phone,Silent Text,andTelegram's optional secret chats also received seven out of seven points on the scorecard.[57]

Developers and funding

[edit]

TextSecure was developed by anonprofitsoftware group called Open Whisper Systems.[59]The group is funded by a combination of donations andgrants,and all of its products are published asfree and open-source software.

As of October 2016,the project has received an unknown amount of donations from individual sponsors via theFreedom of the Press Foundation.[60]Open Whisper Systems has received grants from theKnight Foundation,[61]theShuttleworth Foundation,[62]and theOpen Technology Fund,[63]a U.S. government funded program that has also supported other privacy projects like the anonymity softwareTorand the encrypted instant messaging appCryptocat.

See also

[edit]

References

[edit]
  1. ^abcGreenberg, Andy (25 May 2010)."Android App Aims to Allow Wiretap-Proof Cell Phone Calls".Forbes.Archived fromthe originalon 21 January 2012.Retrieved28 February2014.
  2. ^ab"TextSecure Private Messenger".Google Play.Archived fromthe originalon 19 October 2015.Retrieved19 October2015.
  3. ^abMarlinspike, Moxie (2 November 2015)."Just Signal".Open Whisper Systems.Retrieved2 November2015.
  4. ^Open Whisper Systems."List of languages supported by TextSecure".GitHub.Retrieved15 March2014.
  5. ^abOpen Whisper Systems."TextSecure".GitHub.Retrieved26 February2014.
  6. ^abOpen Whisper Systems."TextSecure-Server".GitHub.Retrieved2 March2014.
  7. ^abcOpen Whisper Systems (6 March 2015)."Saying goodbye to encrypted SMS/MMS".Retrieved22 March2015.
  8. ^abcGarling, Caleb (2011-12-20)."Twitter Open Sources Its Android Moxie | Wired Enterprise".Wired.Retrieved2011-12-21.
  9. ^"Company Overview of Whisper Systems Inc".Bloomberg Businessweek. Archived fromthe originalon March 4, 2014.Retrieved2014-03-04.
  10. ^Tom Cheredar (November 28, 2011)."Twitter acquires Android security startup Whisper Systems".VentureBeat.Retrieved2011-12-21.
  11. ^Yadron, Danny (9 July 2015)."Moxie Marlinspike: The Coder Who Encrypted Your Texts".The Wall Street Journal.Retrieved10 July2015.
  12. ^Andy Greenberg (2011-11-28)."Twitter Acquires Moxie Marlinspike's Encryption Startup Whisper Systems".Forbes.Retrieved2011-12-21.
  13. ^Garling, Caleb (2011-11-28)."Twitter Buys Some Middle East Moxie | Wired Enterprise".Wired.Retrieved2011-12-21.
  14. ^Chris Aniszczyk (20 December 2011)."The Whispers Are True".The Twitter Developer Blog.Twitter. Archived fromthe originalon 24 October 2014.Retrieved22 January2015.
  15. ^"TextSecure is now Open Source!".Whisper Systems. 20 December 2011. Archived fromthe originalon 6 January 2012.Retrieved22 January2015.
  16. ^Pete Pachal (2011-12-20)."Twitter Takes TextSecure, Texting App for Dissidents, Open Source".Mashable.Retrieved2014-03-01.
  17. ^"RedPhone is now Open Source!".Whisper Systems. 18 July 2012. Archived fromthe originalon 31 July 2012.Retrieved22 January2015.
  18. ^abAndy Greenberg (29 July 2014)."Your iPhone Can Finally Make Free, Encrypted Calls".Wired.Retrieved18 January2015.
  19. ^ab"A New Home".Open Whisper Systems. 21 January 2013.Retrieved23 January2015.
  20. ^abBrian Donohue (Feb 24, 2014)."TextSecure Sheds SMS in Latest Version".Threatpost.Retrieved2014-03-01.
  21. ^Christine Corbett (27 March 2013)."Sure!".Open Whisper Systems.Retrieved2014-03-16.
  22. ^abcdMoxie Marlinspike (24 February 2014)."The New TextSecure: Privacy Beyond SMS".Open Whisper Systems.Retrieved26 February2014.
  23. ^"Free, Worldwide, Encrypted Phone Calls for iPhone".Open Whisper Systems. 29 July 2014.
  24. ^Michael Mimoso (29 July 2014)."New Signal App Brings Encrypted Calling to iPhone".Threatpost.
  25. ^Jon Evans (29 July 2014)."Talk Private To Me: Free, Worldwide, Encrypted Voice Calls With Signal For iPhone".TechCrunch.AOL.
  26. ^Micah Lee (2015-03-02)."You Should Really Consider Installing Signal, an Encrypted Messaging App for iPhone".The Intercept.Retrieved2015-03-03.
  27. ^Megan Geuss (2015-03-03)."Now you can easily send (free!) encrypted messages between Android, iOS".Ars Technica.Retrieved2015-03-03.
  28. ^BastienLQ (20 April 2016)."Change the name of SMSSecure".GitHub(pull request). SilenceIM.Retrieved27 September2016.
  29. ^"TextSecure-Fork bringt SMS-Verschlüsselung zurück".Heise(in German). 2 April 2015.Retrieved29 July2015.
  30. ^"SMSSecure: TextSecure-Abspaltung belebt SMS-Verschlüsselung wieder".Der Standard(in German). 3 April 2015.Retrieved1 August2015.
  31. ^abcdRottermanner et al. 2015,p. 5
  32. ^abRottermanner et al. 2015,p. 9
  33. ^DJ Pangburn (3 March 2014)."TextSecure Is the Easiest Encryption App To Use (So Far)".Motherboard. Archived fromthe originalon 14 March 2014.Retrieved14 March2014.
  34. ^abMoxie Marlinspike (5 May 2014)."Private Group Messaging".Open Whisper Systems.Retrieved2014-07-09.
  35. ^ab"How can I get TextSecure working with my Google Voice number?".Open Whisper Systems. 6 March 2015. Archived fromthe originalon 6 September 2015.Retrieved2 January2016.
  36. ^abOpen Whisper Systems (18 March 2014)."Why do I need Google Play installed to use TextSecure on Android?".Archived fromthe originalon 5 September 2015.Retrieved2 January2016.
  37. ^"Moxie Marlinspike - 40 under 40".Fortune.Time Inc. 2016. Archived fromthe originalon 3 February 2017.Retrieved6 October2016.
  38. ^Unger et al. 2015,p. 241
  39. ^abFrosch et al. 2016
  40. ^abcdUnger et al. 2015,p. 239
  41. ^Frosch et al. 2016,p. 7
  42. ^abcRottermanner et al. 2015,p. 4
  43. ^abcMoxie Marlinspike (3 January 2013)."The Difficulty Of Private Contact Discovery".Open Whisper Systems.Retrieved25 March2014.
  44. ^Rottermanner et al. 2015,p. 3
  45. ^Andy Greenberg (2013-12-09)."Ten Million More Android Users' Text Messages Will Soon Be Encrypted By Default".Forbes.Retrieved2014-02-28.
  46. ^Seth Schoen (2013-12-28)."2013 in Review: Encrypting the Web Takes A Huge Leap Forward".Electronic Frontier Foundation.Retrieved2014-03-01.
  47. ^abMoxie Marlinspike (2013-12-09)."TextSecure, Now With 10 Million More Users".Open Whisper Systems.Retrieved2014-02-28.
  48. ^Sinha, Robin (20 January 2016)."CyanogenMod to Shutter WhisperPush Messaging Service on February 1".Gadgets360.NDTV.Retrieved4 March2016.
  49. ^Tom Ritter (14 Oct 2013)."Working with the Open Technology Fund".iSEC Partners.Retrieved4 May2015.
  50. ^Pauli, Darren."Auditors find encrypted chat client TextSecure is secure".The Register.Retrieved4 November2014.
  51. ^Max Eddy (11 March 2014)."Snowden to SXSW: Here's How To Keep The NSA Out Of Your Stuff".PC Magazine: SecurityWatch.Retrieved2014-03-16.
  52. ^Hanno Böck (Mar 11, 2014)."Snowden empfiehlt Textsecure und Redphone"(in German). Golem.de.Retrieved2014-03-16.
  53. ^"The Virtual Interview: Edward Snowden - The New Yorker Festival".YouTube.The New Yorker. Oct 11, 2014.RetrievedMay 24,2015.
  54. ^Alan Yuhas (May 21, 2015)."NSA surveillance powers on the brink as pressure mounts on Senate bill – as it happened".The Guardian.RetrievedMay 24,2015.
  55. ^Zack Beauchamp (May 21, 2015)."The 9 best moments from Edward Snowden's Reddit Q&A".Vox Media.RetrievedMay 24,2015.
  56. ^"Surveillance Self-Defense. Communicating with Others".Electronic Frontier Foundation. 2014-10-23.
  57. ^abc"Secure Messaging Scorecard. Which apps and tools actually keep your messages safe?".Electronic Frontier Foundation. 2014-11-04. Archived fromthe originalon 2016-11-15.Retrieved2014-11-08.
  58. ^Stephanie Mlot (2014-11-18)."WhatsApp Rolling Out End-to-End Encryption".PC Magazine.Retrieved2014-11-24.
  59. ^Franceschi-Bicchierai, Lorenzo (18 November 2014)."WhatsApp messages now have Snowden-approved encryption on Android".Mashable.Retrieved23 January2015.
  60. ^"Donate to Support Encryption Tools for Journalists".Freedom of the Press Foundation.Retrieved17 October2016.
  61. ^"TextSecure".Knight Foundation.Retrieved5 January2015.
  62. ^"Moxie Marlinspike".Shuttleworth Foundation. September 2013. Archived fromthe originalon 18 January 2015.Retrieved14 January2015.
  63. ^"Open Whisper Systems".Open Technology Fund.Retrieved26 December2015.

Literature

[edit]
  • Frosch, Tilman; Mainka, Christian; Bader, Christoph; Bergsma, Florian; Schwenk, Jörg; Holz, Thorsten (March 2016). "How Secure is TextSecure?".2016 IEEE European Symposium on Security and Privacy (EuroS&P).2016 IEEE European Symposium on Security and Privacy (EuroS&P). Saarbrücken, Germany: IEEE. pp. 457–472.CiteSeerX10.1.1.689.6003.doi:10.1109/EuroSP.2016.41.ISBN978-1-5090-1752-2.
  • Rottermanner, Christoph; Kieseberg, Peter; Huber, Markus; Schmiedecker, Martin; Schrittwieser, Sebastian (December 2015).Privacy and Data Protection in Smartphone Messengers(PDF).Proceedings of the 17th International Conference on Information Integration and Web-based Applications & Services (iiWAS2015). ACM International Conference Proceedings Series.ISBN978-1-4503-3491-4.Retrieved18 March2016.
  • Unger, Nik; Dechand, Sergej; Bonneau, Joseph; Fahl, Sascha; Perl, Henning; Goldberg, Ian Avrum; Smith, Matthew (2015)."SoK: Secure Messaging"(PDF).2015 IEEE Symposium on Security and Privacy.Proceedings of the 2015 IEEE Symposium on Security and Privacy. IEEE Computer Society's Technical Committee on Security and Privacy. pp. 232–249.doi:10.1109/SP.2015.22.ISBN978-1-4673-6949-7.
[edit]