{"id":189315,"date":"2017-04-25T04:42:33","date_gmt":"2017-04-25T08:42:33","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/encrypted-chat-took-over-lets-encrypt-calls-too-huffington-post\/"},"modified":"2017-04-25T04:42:33","modified_gmt":"2017-04-25T08:42:33","slug":"encrypted-chat-took-over-lets-encrypt-calls-too-huffington-post","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/jitsi\/encrypted-chat-took-over-lets-encrypt-calls-too-huffington-post\/","title":{"rendered":"Encrypted Chat Took Over. Let&#8217;s Encrypt Calls, Too &#8211; Huffington Post"},"content":{"rendered":"<p><p>      By Lily Hay Newman for WIRED.    <\/p>\n<p>    WIRED  <\/p>\n<p>      As end-to-end encrypted messaging apps have exploded in      popularity, several well-known services have added encrypted      calls as well. Why not, right? If it works for text-based      chat, voice seems like a natural extension. If only it were      that easy.    <\/p>\n<p>      Encrypting calls has plenty of value, keeping conversations      strictly between the two parties. They can circumvent      government wiretaps, or criminal snooping. But a host of      technical challenges with facilitating the calls themselves      has slowed the spread of voice over internet protocol      overall. Bandwidth is expensive. Firewalls and network      filters make it harder to route data streams. Even basic call      quality issues, like delays and echoes, prove difficult to      fix. Adding encryption on top of all of this takes additional      resources and specialized developers.    <\/p>\n<p>      All of which has delayed encrypted calling  but not stopped      it. And a new groundswell of enthusiasm is bringing more      options than ever.    <\/p>\n<p>      The challenges of making reliable encrypted calling starts      with the underlying premise of internet-based calls. Theyre      hard. While VoIP calling has become more reliable over the      years, it remains technically challenging in itself,      especially when people use cellular data instead of more      stable ethernet or Wi-Fi connections.    <\/p>\n<p>      Despite those challenges, Signal, the well-regarded secure      communication platform, has offered encrypted calling since      2014. And when WhatsApp followed in 2016, bringing encrypted      calls and video chat to more than a billion users, it helped      shake off some longstanding inertia. Other secure messaging      apps like Wire and Telegram have added encrypted calling over the      last year. Signal itself even rolled out call quality      improvements in February.    <\/p>\n<p>      Signal developer Open Whisper Systems open-sources its code,      so that companies can borrow from it to build their own      encrypted chat and calling features. For example, while      WhatsApps overall setup is proprietary, it bases the key      exchange for its end-to-end encrypted messages and calls on      Signal Protocol. Its users have to trust that it is      implementing true end to end encryption in the way it claims.      In exchange it brings some form of end to end encryption to      an enormous user base that would probably otherwise have      little exposure to or protection from the feature. And      customers who dont have faith in a large provider like      WhatsApp now have other options, given the recent      proliferation of both VoIP in general and encryption      specifically.    <\/p>\n<p>      Theres so much happening right now in this space which is      really exciting, says Nathan Freitas, the founder and      director of the Guardian Project, a privacy and security      nonprofit that worked on an encrypted calling platform called      Open Secure Telephony      Network. In 2012 there was just Skype basically. Google      Hangouts didnt even exist. FaceTime existed kind of. So      were really happy when theres so much public innovation      that includes privacy and security.    <\/p>\n<p>      Though not nearly as much as there could be, if everyone      could get on the same page.    <\/p>\n<p>      As with messaging, end-to-end encrypted calls require that      both ends of the conversation use the same system. In other      words, using Signal to call a landline wont cut it; you need      to connect with another Signal user. Given this reality, many      developers naturally gravitate to implementing encryption in      closed systems; its easier both to manage and monetize.    <\/p>\n<p>      For users, though, this approach has downsides. Unless the      developer makes the product fully open source, or allows for      extensive independent auditing, theres no guarantee that the      encryption implementation works as advertised. The lock-in      factor also limits who you can safely communicate with, which      slows adoption.    <\/p>\n<p>      Imagine, instead, an open communication standard that      includes end-to-end encryption. It would allow secure      communication with more people between different products and      interfaces, because the protocols facilitating the end to end      encryption would be the same.    <\/p>\n<p>      The Guardian Projects OSTN experiment attempted to create      exactly that sort of comprehensive, open communication suite.      It focuses on using existing open, interoperable      communication standards, employing classic protocols like      ZRTP, which was developed      in the mid 2000s by PGP creator Phil Zimmerman, and SRTP,      which was developed in the early 2000s at Cisco. It also      coordinates and controls its voice calls using the Session      Initiation Protocol, developed by the telecom industry in the      mid 1990s.    <\/p>\n<p>      That retro backbone didnt come by choice; there simply      arent a lot of more modern open protocol options available.      Most big VoIP plus encryption advances have come from private      companies like Skype (now owned by Microsoft), Google, and      Apple, who offer varying degrees of encryption protection for      calls and tend to value locked-in users over      interoperability. That left OSTN with old tools.    <\/p>\n<p>      While theyre very powerful, these are things that are 10,      20, 30 years old in terms of the architecture and the      thinking, Freitas says. Theyre definitely showing their      age.    <\/p>\n<p>      And while a few smaller services, like PrivateWave and Jitsi, have adopted OSTN,      the decision by larger companies to go it alone has limited      its open-protocol dreams. Thats especially a shame for      people who need absolute guarantees of security.    <\/p>\n<p>      With proprietary apps, it can be hard for a user to tell if      end-to-end encryption is enabled on both ends. Or, in the      case of apps whose encryption protocols have not been fully      vetted, whether it works as advertised to begin with.    <\/p>\n<p>      For mainstream services, crypto is a nice add-on to give      users the idea that they can feel more secure, but thats      completely different than when your [customers] are people      who are under threat, says Bjoern Rupp, the CEO of the      boutique German secure communication firm CryptoPhone. If      you have to fear for your life, not all secure communication      systems are designed for that.    <\/p>\n<p>      Encryption die-hards can host their own system using open      standards like OSTN, similar to how you might host your own      email server. Though it takes some technical knowhow, its an      option that gives users real control and that isnt possible      with closed systems. Another option is to use a security      first service like CryptoPhone that offers an integrated,      one-stop solution.    <\/p>\n<p>      CryptoPhones can only call other CryptoPhones, but the      company made that choice so it could control the security and      experience of both hardware and software. To reconcile this      closed system with transparency, the company is open source      and invites independent review. It also has over a decade of      experience. CryptoPhone has been making high-end commercial      products for secure voice calling for a long time, the      Guardian Projects Freitas says. They had these crypto flip      phones, which were awesome.    <\/p>\n<p>      None of which leaves the average consumer with widespread      encrypted calling that works across multiple services. There      may be some help on the way, though, in the form of a new,      open, decentralized communication standard called Matrix that      includes end to end encryption for chat, VoIP calling, and      more. Matrix could be a clean, easy to implement standard      underlying other software. For instance, if Slack and Google      Hangouts both used the Matrix standard, you would be able to      Slack someone from Hangouts and vice versa, similar to how      you can send emails to anyone using their email address,      regardless of what provider they use.    <\/p>\n<p>      The net owes its existence to open interoperability, says      Matthew Hodgson, technical lead of Matrix. Then people build      silos to capture value, which is fair enough, but you get to      a saturation point where the silos start really stifling      innovation and progress through monopolism.    <\/p>\n<p>      The catch, of course, is getting buy-in from companies that      have little incentive, or getting new services built on a      standard like Matrix to take off. Walled gardens tend to      produce more profit than open ones.    <\/p>\n<p>      Still, having these new options is an important first step.      And combined with the broader proliferation of encrypted      voice-calling apps, change finally seems to be coming from a      lot of directions at once. I think theres a longer-term      project going on called the internet, Freitas says. Some of      us still believe in it.    <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.huffingtonpost.com\/entry\/encrypted-chat-took-over-lets-encrypt-calls-too_us_58fe1d74e4b0f420ad99ca41\" title=\"Encrypted Chat Took Over. Let's Encrypt Calls, Too - Huffington Post\">Encrypted Chat Took Over. Let's Encrypt Calls, Too - Huffington Post<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> By Lily Hay Newman for WIRED. WIRED As end-to-end encrypted messaging apps have exploded in popularity, several well-known services have added encrypted calls as well.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/jitsi\/encrypted-chat-took-over-lets-encrypt-calls-too-huffington-post\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94876],"tags":[],"class_list":["post-189315","post","type-post","status-publish","format-standard","hentry","category-jitsi"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/189315"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=189315"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/189315\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=189315"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=189315"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=189315"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}