back to article Mega's unbreakable encryption proves to be anything but

Mega, the New Zealand-based file-sharing biz co-founded a decade ago by Kim Dotcom, promotes its "privacy by design" and user-controlled encryption keys to claim that data stored on Mega's servers can only be accessed by customers, even if its main system is taken over by law enforcement or others. The design of the service, …

  1. Yet Another Anonymous coward Silver badge

    Simpler solution

    Men in black suits visit sysadmin

    "Persuade" sysadmin to upload new version of client software

    New version copies keys/decrypted documents to men in black suits

    Sysadmin has nasty accident

    1. Anonymous Coward
      Anonymous Coward

      Re: Simpler solution

      I'm pretty sure that there's no current way to protect against the "gun to head" security bypass.

      A lot of wives / husbands / children wait on a fix for this.

    2. Gene Cash Silver badge

      Re: Simpler solution

      https://xkcd.com/538/

    3. StrangerHereMyself Silver badge

      Re: Simpler solution

      The Five Eyes already have legislation to enable them to do just that. But so far the threats of many service providers (such as WhatsApp) to pull the rug from under the service has refrained them from enacting this draconian measure.

      I hope Mega threatens to do the same if the authorities knock on their door with a software patch for their client.

  2. chololennon

    Still better than others

    "The findings, detailed on a separate website, proved sufficiently severe that Kim Dotcom, no longer affiliated with the file storage company, advised potential users of the service to stay away."

    Well, I still prefer MEGA over Google Drive, Dropbox or Microsoft OneDrive... the last 3 don't have encryption at all.

    1. Criminny Rickets

      Re: Still better than others

      Which is my I have a folder encrypted with Encfs in Dropbox. At least it's better than what they themselves offer.

    2. Sora2566 Bronze badge

      Re: Still better than others

      You can create a virtual hard drive, encrypt it with your personal favorite method (I use BitLocker), then stash the encrypted VHD in your Dropbox. (This doesn't work with Google Drive or OneDrive due to lack of bit-wise comparison - they'd upload the whole file every time it changed).

      Don't have Dropbox running while the drive is mounted and decrypted though, just in case.

    3. VoiceOfTruth Silver badge

      Re: Still better than others

      -> Well, I still prefer MEGA over Google Drive, Dropbox or Microsoft OneDrive... the last 3 don't have encryption at all.

      Knowing that means you should roll your own - gpg encryption, for example. However as has now been shown, MEGA (or any other site offering encryption) may lull you into a false sense of security.

    4. jake Silver badge

      Re: Still better than others

      Personally, I just hang a small BSD-based file server (only 4TB of RAID-5, YMMV) off my Great Aunt in Duluth's network connection[0]. Encryption of my choice. No fuss, no muss, and it always works when I want it to work, not when some provider with its head in the clouds wants it to work.

      [0] Mirrored at a couple of other relative's homes.

      1. sev.monster Silver badge
        Megaphone

        Re: Still better than others

        Great Aunt in Duluth is my band name.

      2. druck Silver badge

        Re: Still better than others

        Which is great unless she is one of these older folks that go around switching off all the wall sockets every night, in case it should suddenly catch fire.

    5. Anonymous Coward
      Anonymous Coward

      Re: Still better than others

      Google Play app signing..... Google builds end-user specific versions of apps, and signs them as if directly from the company. You hand them your app signing key to let them do that.

      So inherently any Android app from Google Play is untrustable, even if the company that makes it is trustable, because Google could give you a tailored surveillance version, and sign it as if it was legitimately from the app provider.

      It wouldn't have to be the target software either, that receives the special package, any app on the same device could receive a special package. The mere fact you installed say, Telegram or Mega, or whatever, may cause you to receive a special version of some other common software.

      You see the push to legalize the undermining of encryption? All those "for the children" and "to catch drug dealers" stories? Yet the technical means to do so already exists and is trivial to do remotely and in bulk. Do you imagine it isn't already being abused? I think they're trying to post-legalize their surveillance methods.

      The Kim Dotcom surveillance: NZ law forbade NZ spooks surveillance of NZ residents, they did it anyway. Their surveillance is supposed to be for security and terrorism, not copyright, they did it anyway. The law was changed to make it legal after the fact. So notice the push to undermine encryption and realize the purpose isn't to obtain technical means to do that, but rather to legalize their existing technical means.

      1. amanfromMars 1 Silver badge

        Secrecy is Always All Ways Abused and Misused ‽ So let there be an Almighty Light ‽

        You see the push to legalize the undermining of encryption? All those "for the children" and "to catch drug dealers" stories? Yet the technical means to do so already exists and is trivial to do remotely and in bulk. Do you imagine it isn't already being abused? I think they're trying to post-legalize their surveillance methods. .... Anonymous Coward

        The crashing reaction of present day, current running incumbent petrified fiat MMT [Magic Money Tree/Modern Monetary Theory] capitalised systems of operation for administration which has resulted in serial ineffectual universal inaction exponentially exacerbating and compounding mounting existential difficulties, and which sees failed sysadmins venturing along the Fascist Big Brother Postmodern Nazi Ideological Root in attempts to maintain and sustain and retain overall absolute command and control, have both Secret and Security Intelligence Service Agencies all too aware of the Titanic Opportunities Available to Readily Exploit the Catastrophic Dangers which Exist in Any and All Colossal Proprietary Intellectual Property Blackholes Rendering a Universal Intelligence Deficit and Expanding General Knowledge Debt.

        And it would be unnatural, and therefore most unlikely to an inordinate nth degree, that such opportunities are not liable to be fully explored and diligently exercised exhaustively in a sort of undeclared war against the law and order forces and sources of future ignorance supporting a self serving destructive arrogance.

        To further suggest that such Secret and Security Intelligence Service Agencies deliver to one an overwhelming advantage is a colossal misunderestimation and therefore most probably of very great interest to more than just a chosen few with an avid and rabid need to know about such deep and dark enlightening exalted matters .... and how they are best immaculately used.

      2. VoiceOfTruth Silver badge

        Re: Still better than others

        NZ like Australia, Canada, and the UK are the great bootlickers of the world.

        1. Jimmy2Cows Silver badge
          Trollface

          Re: Still better than others

          Such a shame we can't get people banned simply for being obnoxious twats.

          1. Anonymous Coward
            Anonymous Coward

            Re: Still better than others

            Since he's being paid by the rouble, he's had to double the number of posts each month since February.

    6. StrangerHereMyself Silver badge

      Re: Still better than others

      I wholeheartedly agree. Wuala was the last standout and they were probably clobbered into stopping their service because it was *to* secure and LEA were accusing them of harboring child abusers (oh, the horror!)

      These revelations will lead to improvements which will make the service eventually secure.

      1. Anonymous Coward
        Anonymous Coward

        Re: Still better than others

        "accusing them of harboring child abusers (oh, the horror!)"

        are you... the Duke of York?

    7. fidodogbreath

      Re: Still better than others

      Well, I still prefer MEGA over Google Drive, Dropbox or Microsoft OneDrive... the last 3 don't have encryption at all.

      They do, but they also have the decryption key.

      ...

      Never mind, you're right.

  3. Bitsminer Silver badge

    Not just security

    ...avoid repeated ad hoc implementations that repeat the same errors...

    It seems to be just security implementations that get detailed analysis that point out the design errors, surprising and incorrect assumptions and software bugs.

    There are a thousand other software categories that don't receive the same attention. And they also suffer from "ad hoc implementations". But they don't get fixed via responsible disclosure.

    Seems to be an issue with the programmers, and not the technology.

  4. Anonymous Coward
    Anonymous Coward

    No tinfoil need

    Why would you trust a service Kim Schitz (aka the YIHAT asshat) built? He's popular now because of the pirate bay generation, but the clown is a serial fraudster, and was one all the way back to when he was in Germany.

    Regardless of his disavowed involvement, or recommendations to stay away,

    Generally the best way to keep stuff in remote storage private is to encrypt it yourself. Yes that can lead to decrypting your decrypted files again. You'll live. If it's important, you should probably use a second and separate tool to protect your data.

    The potential disclosure of private keys for in-platform messaging points at issues that over the top encryption won't fix as easily, so over the top encryption isn't a cure-all in this case.

    1. jonha

      Re: No tinfoil need

      +1 re you words about Kim Schmitz.

      But -1 for "the BEST way to keep stuff in remote storage private is to encrypt it yourself".

      This is not the best way, it's the ONLY way. I have accounts w/ Google and pCloud and absolutely nothing leaves my LAN going to their servers that hasn't been locally encrypted... check out rclone if you haven't done so already.

      Plus some things (ie my KeePass databases) are additionally stored in a secure 7z archive before being uploaded.

  5. Anonymous Coward
    Anonymous Coward

    Puzzled Old Fool Wonders About Permanently Stored Keys.....

    Quote: "... allow full compromise of all user keys encrypted with the master key..."

    Ah...."master key"....... and then there's the public key stuff (PGP, etc) with public keys and private keys......

    In 1976 Diffie and Hellman published a mechanism which allowed CALCULATION of keys only twice: at encryption time and again at decryption time. These calculated keys are:

    (1) Random FOR EVERY TRANSACTION

    (2) Destroyed after use

    Oh.....and nothing at all related to the keys is ever available in public. Snoops can only see the encrypted transactions in transit.....nothing else!

    So when PC Plod comes along "demanding keys" users will say "Sorry....the keys are calculated by the software....I have absolutely no knowledge of keys....take my computers and do your worst!!"

    Why am I still hearing about security problems created by "master keys" and other permanently saved keys? Someone else here can explain!!

    P.S. Tooling needed to implement D/H encryption might, as a minimum be: gcc, gdb, gmp ..... all open source and widely available.

    P.P.S. FYI -- gmp helps with 8192 bit processing!!

    1. Anonymous Coward
      Anonymous Coward

      Re: Puzzled Old Fool Wonders About Permanently Stored Keys.....

      Diffie-Hellman is a key exchange protocol, not an encryption protocol. It's used in TLS to generate session keys for both sending and receiving parties. The keys the article is talking about are symmetric encryption keys used to encrypt the files. If you use PasswordSafe or similar then the "Master key" is the password you use to unlock the safe, and the "user keys" are the passwords stored there.

      1. Anonymous Coward
        Anonymous Coward

        Re: Puzzled Old Fool Wonders About Permanently Stored Keys.....

        Quote: "Diffie-Hellman is a key exchange protocol..."

        Did you read the "Old Fool's" post? The point seems to be that D/H allows for COMPLETELY TRANSIENT RANDOM keys for ANY TRANSACTION.

        .....Yup.....no "master key" needed!!

        Did I miss something?

        1. F Seiler

          Re: Puzzled Old Fool Wonders About Permanently Stored Keys.....

          DH allows two peers to construct an encryption key for the sender and a decryption key at the recipient while talking in public.

          The recipient still needs to store the decryption key if she opts to not decrypt right now but only later.

          For a scenario where a person wants to decrypt their own data later on, the procedure is pointless.

        2. Michael Wojcik Silver badge

          Re: Puzzled Old Fool Wonders About Permanently Stored Keys.....

          Did I miss something?

          An opportunity to learn how Diffie-Hellman (which should really be "Diffie-Hellman-Markle", as Diffie pointed out some years ago, and arguably should be called "Diffie-Hellman-Markle-but-only-because-Ellis-Cocks-Williamson-weren't-allowed-to-publish") key exchange works without UNNECESSARY SHOUTING.

          OP's post was wrong. That's the other thing you missed.

          Encrypted data requires a key to decrypt it; that's what "encryption" means. Can you replace the actual key data with a procedure to generate it? Sure. Does that gain you anything, from a technical or legal perspective? It does not. By Kerckhoff's Principle, whatever is secret is the key; making the key fancy doesn't mean it stops being a key. And laws are rarely stymied by someone being a clever dick. A judge isn't going to say "oh well done, you've got us there!". He'll just throw you in the pen for contempt.

  6. pip25
    WTF?

    Weird timing

    Mega has been around for many years, it's reasonably well known, how come no one tried hacking it before? Or have previous attempts failed and these disclosed vulnerabilities are more complex than they seem at first glance?

    1. Michael Wojcik Silver badge

      Re: Weird timing

      It's quite likely various groups have examined it and found these or other vulnerabilities, and kept them to themselves. You know there's a whole industry around selling vulnerabilities and exploits that haven't been published, right? There's a good free RAND study on that business.

      And researchers research the things that attract their attention. It's not like the IT-security community is rigorously organized. Someone says, hmm, today I'll poke at this thing. Read researcher blogs if you want to see how it generally goes. Some people (e.g. SANS researchers) typically chase attacks that come into their honeypots; some track down malware and analyze it (Marcus Hutchins does a bunch of this, as does someone who posts to Full Disclosure as "malvuln"); some go after particular commercial targets (e.g. Stefan Kanthak and Microsoft, particularly software installers); some follow what's hot in the news (Graham Cluley, say, or Paul Ducklin); some are more interested in people (Brian Krebs) or policy (Bruce Schneier).

      So this may just be the first time a prominent research organization has had some of its people publish research on Mega. Or maybe it's happened before and you and I just didn't notice. It's a big industry.

  7. EnviableOne
    Megaphone

    repeat after me

    Thou shalt not roll thy own encryption

    1. Anonymous Coward
      Anonymous Coward

      Re: repeat after me

      then for 100% security repeat: trust no one elses implementation of encryption.

      1. Claptrap314 Silver badge

        Re: repeat after me

        You must trust someone. The problem is that few people even have the education to even understand WHY they should not trust themselves. (Most can be browbeaten into submission, but that's a separate matter.)

        I was just talking about this to a friend. There are probably about 3000 people in the world today who I would trust to write a crypto library. I'm arrogant enough to include myself in that list. But because I _am_ properly trained, I also know that it would take me FAR longer to convince myself that I had not messed something up than would be worth it.

        1. martinusher Silver badge

          Re: repeat after me

          Implementing an encryption algorithm is straightforward enough, assuming the algorithm is sound. The problem is always in the exchange and storage of keys. So I trust myself to write the encryption -- there's usually test cases to verify the code's correct with the standard -- but key exchanges are a completely different matter. Just implementing a cryptographically secure random number generator is a work of art.

          I'd also be very wary of any persistent code in the system that performs encryption services. This probably OK for day to day work but for anything realistic you need something with zero persistence -- its used, it goes away and erases all traces. Running anything on a general purpose machine is asking for trouble -- you think you know and control what's running on that system, now prove it.

          1. Anonymous Coward
            Anonymous Coward

            Re: repeat after me

            @martinusher

            Quote; "... key exchanges are a completely different matter..."

            Have I mentioned Diffie/Hellman and CALCULATED KEYS?

            (1) The D/H handshake DOES NOT EXCHANGE KEYS

            (2) The keys are calculated LOCALLY and then destroyed

            (3) The keys are RANDOM for every transaction

            There are NO PERSISTENT KEYS.

            "Key exchanges" cease to be a "completely different matter".......because there are no key exchanges!!!

            Did I miss something along the way?

            1. AcornAnomaly

              Re: repeat after me

              "Did I miss something along the way?"

              An understanding of what Diffie-Hellman is for, and what it does, perhaps?

              DH allows two communicating parties to generate a shared key between the two they can use for a secure communication channel, without publicly communicating anything that can be reversed to discover what the key is externally.

              And yes, once communication is complete, both sides throw the key away.

              The problem is, what do you do when you need the key again? Say, to decrypt your own encrypted data later? You can't, because you threw the key away. That's the point of using DH for perfect forward secrecy.

              You "somehow" use DH to generate a key to encrypt a file (leaving aside the fact that DH is a key exchange protocol, meaning you need to communicate with another party to generate DH keys), encrypt the file, and throw the key away.

              Congrats, you now have a pile of useless bits.

              1. Anonymous Coward
                Anonymous Coward

                Re: repeat after me

                @AcornAnomaly

                Quote: "....decrypt your own encrypted data later? You can't...."

                Congrats.......you failed to understand D/H!!

                Didn't you notice that the throw away key is CALCULATED locally when needed? Yes......the key was thrown away....but the two D/H tokens are still available....so that the key can be CALCULATED when required.

                The whole point of D/H is that the shared tokens tell a third party NOTHING about the key!!

                Congrats......but perhaps a bit more research might be useful.

          2. Michael Wojcik Silver badge

            Re: repeat after me

            It's not always in key management. People make plenty of other mistakes, too. I note of the attacks listed in the article, none appear to be key-management vulnerabilities as such. They have a couple of oracles that leak key material, which is a protocol implementation error; they have integrity violations, which is separate from keying; and they appear to have a vulnerability which escalates the key-recovery attacks which may be due to the use of ECB mode. (I haven't read the paper and it isn't clear from the article.)

            There are a great many mistakes people make. Many of them have to do with key generation, key hygiene, and other keying issues; but many do not.

    2. Anonymous Coward
      Anonymous Coward

      Re: repeat after me

      Really?

      The Bruce Schneier book Applied Cryptography would be a great place to start learning about "roll your own".

      And anyway, most encrypted messages don't need to be secret for ever (which is quite a long time)....two or three months is usually sufficient!

      *

      CfyNOPwZKPw74xQlgPs1IlaJK5YDQZGJcH0JAXoRkXWhyTstUZsHmvW5AXoZEtqP2Hmh4HoF2H8J

      iVUzutyHQB6L458fCJ0dcrU52noXQ9KDqRUVOh4JKdGlGvAtMTEtud0fO9anud0fGV4hgFg76xur

      4rqjcH4VqbQjwvqVe36pKHkDyVKBcBGV6LolEFI90Laz6zITSZKzqH6HCNEX8hoDK3ClMHCJoXe5

      gLebAZQNMpYFevGHCNaB8hQtcZ8bwheN4n0XcFIdQx6LWlMjuve7wTg3EhOzcZmD2tkP0lGbuTgR

      2t2VglOpcLsrshipmdktiluDQbSDG5cBY52Lij4HWFqH6haLiLqNEjudk3gxgNotirEx4h4FqfAJ

      AzWPc1azSzQRsTAfCZy3oVaNGtMFIra1wZSrwhcHSDmrQ9WTeF4vW94Ji98PsxyLiJefkD2fghsH

      0ZCZKxGFaZEnarcx27s9WBId6LQTKvwROZgzKniNOBQRkDId0LevGz6DSDe10hgTyfkhEZibmH2F

      43WLUFyzoNm1qru70xy7KxUnunoPOpsZYvE74pmNaFsdc5EbepuzGVoP0lOx0z2LA1eLKLonodcb

      wFOfILM1UJoPibIbWX2zcB2zEzIvirOjGX8R0P8TUpODUxQ9gliHkvohibQ1ANojUhWNu5A1IbCp

      8Pah0fOJelQj0XsDq5C7G9qdUPgxOxIvmVSROlqjI9CR

      *

      1. jake Silver badge

        Re: repeat after me

        "The Bruce Schneier book Applied Cryptography would be a great place to start learning about why "rolling your own" is probably not a very good idea."

        FTFY

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like