Social:Secure instant messaging

From HandWiki

Secure instant messaging is a form of instant messaging. Both terms refer to an informal means for computer users to exchange messages commonly referred to as "chats". Instant messaging can be compared to texting as opposed to making a mobile phone call. In the case of messaging, it is like the short form of emailing. Secure instant messaging is a specialized form of instant messaging that along with other differences, encrypts and decrypts the contents of the messages such that only the actual users can understand them.

Instant messaging background

Instant messaging has existed in some form or another for decades. Generally, it is a process by which users on a computer network can quickly communicate with one another using short text-based sentences rather than using email. Each user has a piece of software that communicates with a common server that connects the chat sessions. Over the past few years, two distinct settings for the use of instant messaging have evolved.

The first is the corporate or institutional environment composed of many potential users but who are all under the same organizational umbrella.[1]

The second setting is individual users "after work" or at home who do not have a mission-oriented commonality between them, but are more likely family and friends.[2]

In the corporate setting, security risks are apparent from the outset. What stops a disgruntled employee from messaging some sensitive company data to a colleague outside the enterprise? The reverse of that would be the example disgruntled employee downloading some virus or spyware onto his machine inside the corporate firewall to release as desired. Accordingly, organizational offerings have become very sophisticated in their security and logging measures. Typically, an employee or organization member must be granted a login and suitable permissions to use the messaging system. This creating of a specific account for each user allows the organization to identify, track and record all use of their messenger system on their servers.[3]

The specialized requirements of the organizational messaging system, however, run almost completely contrary to what an individual user may need. Typically non-organizational use instant messengers advertise their availability to the Internet at large so that others may know if that person is online. The trend has been too that manufacturers of instant messaging clients offer interoperability with other manufacturer's clients.[4]

This competitive edge grew out of the heretofore use of proprietary communications protocols used by the client manufacturers. Compatibility between clients is likely to become almost universal, as a unified messenger protocol (the Extensible Messaging and Presence Protocol (XMPP)) is being adopted by more and more manufacturers.[citation needed] The XMPP has been, at least in part, formalized by the Internet Engineering Task Force as RFC 6120,[5] RFC 6121[6] and RFC 6122[7] which will further the trend towards instant messaging standardization.[8]

For the typical social individual user this product evolution spells greater ease of use and more features.

Traits of a secure instant messenger

In November 2014, the Electronic Frontier Foundation listed seven traits that contribute to the security of instant messengers:[9]

  • Having communications encrypted in transit between all the links in the communication path.
  • Having communications encrypted with keys the provider does not have access to (end-to-end encryption).
  • Making it possible for users to independently verify their correspondent's identity e.g. by comparing key fingerprints.
  • Having past communications secure if the encryption keys are stolen (forward secrecy).
  • Having the source code open to independent review (open source).
  • Having the software's security designs well-documented.
  • Having a recent independent security audit.

In addition, the security of instant messengers may further be improved if they:

  • Do not log or store any information regarding any message or its contents.
  • Do not log or store any information regarding any session or event.
  • Do not rely on a central authority for the relaying of messages (decentralized computing).

Recent news events have revealed that the NSA is not only collecting emails and IM messages but also tracking relationships between senders and receivers of those chats and emails in a process known as metadata collection.[10] Metadata refers to the data concerned about the chat or email as opposed to contents of messages. It may be used to collect valuable information.[11]

See also

References

  1. "WebEx Connect IM - Products & Services". Cisco. http://www.cisco.com/en/US/products/ps10528/index.html. Retrieved 2015-10-11. 
  2. Tyson, Jeff (2001-03-28). "How Instant Messaging Works - HowStuffWorks". Computer.howstuffworks.com. http://computer.howstuffworks.com/e-mail-messaging/instant-messaging.htm. Retrieved 2015-10-11. 
  3. "Cisco WebEx Messenger: Enterprise Instant Messaging through a Commercial-Grade Multilayered Architecture" (PDF). Cisco.com. http://www.cisco.com/en/US/prod/collateral/ps10352/ps103520/ps10528/Cisco_WebEx_Connect_Security_White_Paper.pdf. Retrieved 2015-10-11. 
  4. "Trillian". Trillian.im. https://www.trillian.im/. Retrieved 2015-10-11. 
  5. "RFC 6120 - Extensible Messaging and Presence Protocol (XMPP): Core". Tools.ietf.org. 2003-12-13. http://tools.ietf.org/html/rfc6120. Retrieved 2015-10-11. 
  6. "RFC 6121 - Extensible Messaging and Presence Protocol (XMPP): Instant Messaging and Presence". Tools.ietf.org. http://tools.ietf.org/html/rfc6121. Retrieved 2015-10-11. 
  7. "RFC 6122 - Extensible Messaging and Presence Protocol (XMPP): Address Format". Tools.ietf.org. http://tools.ietf.org/html/rfc6122. Retrieved 2015-10-11. 
  8. "XMPP Technologies Overview – The XMPP Standards Foundation". Xmpp.org. http://xmpp.org/about-xmpp/technology-overview/. Retrieved 2015-10-11. 
  9. "Secure Messaging Scorecard. Which apps and tools actually keep your messages safe?". Electronic Frontier Foundation. 4 November 2014. https://www.eff.org/node/82654. Retrieved 13 July 2016. 
  10. "N.S.A. Gathers Data on Social Connections of U.S. Citizens". The New York Times. https://www.nytimes.com/2013/09/29/us/nsa-examines-social-networks-of-us-citizens.html?partner=rssnyt&emc=rss&_r=1&. Retrieved 2015-10-11. 
  11. "A Primer on Metadata: Separating Fact from Fiction - Privacy By Design". Privacybydesign.ca. 2013-07-17. http://www.privacybydesign.ca/index.php/paper/a-primer-on-metadata-separating-fact-from-fiction/. Retrieved 2015-10-11.