Twitter takes security tip from spies

Social networking site Twitter has taken steps that make it more difficult for data to be collected on its users without going through legal channels.

Twitter has used an "impossible" mathematical problem first discovered by a British secret agency to protect its users from electronic snooping.

The company said "perfect forward secrecy" (PFS) was now live on all its services, drastically increasing the effort required to intercept its traffic.

It is understood the move is intended to make it more difficult for data to be collected on its users without going through legal channels.

Jim Killock, director of the Open Rights Group (ORG), said it was a "policy move" driven by revelations about mass surveillance by British eavesdropping agency GCHQ and the American National Security Agency (NSA).

He said: "Companies have now realised precisely how vulnerable their information is on the internet. It's no longer a theoretical risk. We know it's been going on now.

"This is about asking users to trust the companies involved and to also force the legal authorities to approach companies directly rather than attempting to seize the data in transit."

In June it was revealed that GCHQ was using a project called Tempora to indiscriminately scoop data from fibre optic cables entering and leaving the UK.

In standard encryption each side of a communication independently generates paired keys - a public key telling others how to encrypt the messages they send to it and a private one used to decode them when they arrive.

The maths involved make it almost impossible to calculate the private key from the public one.

But if an attacker acquires a company's private key it can read anything sent to and from that company's servers - even if it was recorded years earlier.

PFS adds another stage where two machines collaborate on enormous sums to deduce a shared key which is never shared and never used again.

That means an attacker would have to use a more complicated and resource-intensive "man-in-the-middle" strategy specifically targeted at a single communication while it was still going on.

The so-called "Diffie-Hellman" method used by Twitter was first discovered by GCHQ analysts in the early 1970s, but remained secret until it was independently patented by a pair of American cryptographers.

A post on Twitter's engineering blog explained: "If an adversary is currently recording all Twitter users' encrypted traffic, and they later crack or steal Twitter's private keys, they should not be able to use those keys to decrypt the recorded traffic."

Dr Ian Brown, an ORG trustee and associate director of Oxford University's Cyber Security Centre, said PFS "effectively reinforces the rule of law about interception" and described the Diffie-Hellman problem as "effectively impossible."


Share

3 min read

Published

Updated

Source: AAP



Share this with family and friends


Get SBS News daily and direct to your Inbox

Sign up now for the latest news from Australia and around the world direct to your inbox.

By subscribing, you agree to SBS’s terms of service and privacy policy including receiving email updates from SBS.

Download our apps
SBS News
SBS Audio
SBS On Demand

Listen to our podcasts
An overview of the day's top stories from SBS News
Interviews and feature reports from SBS News
Your daily ten minute finance and business news wrap with SBS Finance Editor Ricardo Gonçalves.
A daily five minute news wrap for English learners and people with disability
Get the latest with our News podcasts on your favourite podcast apps.

Watch on SBS
SBS World News

SBS World News

Take a global view with Australia's most comprehensive world news service
Watch the latest news videos from Australia and across the world