Where Have I Heard These Claims Before?
@Jessica_Lyons_Hardcastle
From https://threema.ch/en:
"...Thanks to state-of-the-art end-to-end encryption..."
"...no one other than the intended recipient can read transmitted messages, not even Threema as the service operator..."
We've heard all this before. A "service operator" provides E2EE on the service provider's network-based hardware and software.
The E2EE software and the keys used for E2EE are persistent somewhere in that hardware and software.
As usual, the claims are that "your messaging is secure".......but no one mentions that it is the network and the persistent keys which ALSO need to be secure.
It seems to me that a quite different scheme is much more likely to be private:
(1) Use some publicly available transport (say Gmail)
(2) Use encryption/decryption software which exists ONLY on peer devices (i.e. controlled 100% by the customers, not by the "service operator")
(3) Use a protocol which uses a new randomly chosen key for EVERY message
(4) Use a protocol which NEVER uses persistent keys, and which destroys the randomly chosen keys immediately after use
(5) Use a protocol which NEVER transmits keys across any network
Ah, you say, the protocol requirements in items #3, #4 and #5 are completely impossible.........
.....but you would be quite wrong:
- Applied Cryptography, Bruce Schneier, Chapter 22.1
- Cryptography Engineering, Ferguson/Schneier/Kohno, Chapter 11
Around 3000 lines of vanilla C will do the job, and that includes a nice GUI client!
Another quote (William Burroughs): "The paranoid is a person who knows a little of what is going on."