Reason.com - Free Minds and Free Markets
Reason logo Reason logo
  • Latest
  • Magazine
    • Current Issue
    • Archives
    • Subscribe
    • Crossword
  • Video
  • Podcasts
    • All Shows
    • The Reason Roundtable
    • The Reason Interview With Nick Gillespie
    • The Soho Forum Debates
    • Just Asking Questions
    • The Best of Reason Magazine
    • Why We Can't Have Nice Things
  • Volokh
  • Newsletters
  • Donate
    • Donate Online
    • Donate Crypto
    • Ways To Give To Reason Foundation
    • Torchbearer Society
    • Planned Giving
  • Subscribe
    • Reason Plus Subscription
    • Print Subscription
    • Gift Subscriptions
    • Subscriber Support

Login Form

Create new account
Forgot password

Civil Liberties

Twitter Takes Steps To Frustrate NSA, Other Government Snoops

J.D. Tuccille | 11.25.2013 10:51 AM

Share on FacebookShare on XShare on RedditShare by emailPrint friendly versionCopy page URL
Media Contact & Reprint Requests
Twitter
Twitter

Twitter announced Friday that it's joining other tech companies in implementing "perfect forward secrecy." While many online services already encrypt user comunications and other data, this form of encryption ensures that snoops—we're looking at you, National Security Agency—who break through the encryption get access to only a snippet of data, rather than everything belonging to a user. Even where a warrant is involved, perfect forward secrecy has the potential to limit intrusions, rather than acting as an open-ended skeleton key.

From Twitter's Jacob Hoffman-Andrews:

As part of our continuing effort to keep our users' information as secure as possible, we're happy to announce that we recently enabled forward secrecy for traffic on twitter.com, api.twitter.com, and mobile.twitter.com. On top of the usual confidentiality and integrity properties of HTTPS, forward secrecy adds a new property. If an adversary is currently recording all Twitter users' encrypted traffic, and they later crack or steal Twitter's private keys, they should not be able to use those keys to decrypt the recorded traffic.

The Electronic Frontier Foundation's Parker Higgins describes how perfect forward secrecy works:

How can perfect forward secrecy help protect user privacy against that kind of threat? In order to understand that, it's helpful to have a basic idea of how HTTPS works in general. Every Web server that uses HTTPS has its own secret key that it uses to encrypt data that it sends to users. Specifically, it uses that secret key to generate a new "session key" that only the server and the browser know. Without that secret key, the traffic traveling back and forth between the user and the server is incomprehensible, to the NSA and to any other eavesdroppers.

But imagine that some of that incomprehensible data is being recorded anyway—as leaked NSA documents confirm the agency is doing. An eavesdropper who gets the secret key at any time in the future—even years later—can use it to decrypt all of the stored data! That means that the encrypted data, once stored, is only as secure as the secret key, which may be vulnerable to compromised server security or disclosure by the service provider.

That's where perfect forward secrecy comes in. When an encrypted connection uses perfect forward secrecy, that means that the session keys the server generates are truly ephemeral, and even somebody with access to the secret key can't later derive the relevant session key that would allow her to decrypt any particular HTTPS session. So intercepted encrypted data is protected from prying eyes long into the future, even if the website's secret key is later compromised.

Facebook also plans to implement perfect forward secrecy, and Google has had it in place since 2011. Google points out that "not even the server operator will be able to retroactively decrypt HTTPS sessions," meaning that companies that implement the security can't turn users' lives into open books, no matter the pressure they face.

As fuck-yous to the surveillance state go, this is both welcome, and effective.

The Rattler is a weekly newsletter from J.D. Tuccille. If you care about government overreach and tangible threats to everyday liberty, this is for you.

This field is for validation purposes and should be left unchanged.

NEXT: Obama: I'm "Not a Particularly Ideological Person"

J.D. Tuccille is a contributing editor at Reason.

Civil LibertiesScience & TechnologyTwitterSurveillanceCybersecurity
Share on FacebookShare on XShare on RedditShare by emailPrint friendly versionCopy page URL
Media Contact & Reprint Requests

Hide Comments (26)

Editor's Note: As of February 29, 2024, commenting privileges on reason.com posts are limited to Reason Plus subscribers. Past commenters are grandfathered in for a temporary period. Subscribe here to preserve your ability to comment. Your Reason Plus subscription also gives you an ad-free version of reason.com, along with full access to the digital edition and archives of Reason magazine. We request that comments be civil and on-topic. We do not moderate or assume any responsibility for comments, which are owned by the readers who post them. Comments do not represent the views of reason.com or Reason Foundation. We reserve the right to delete any comment and ban commenters for any reason at any time. Comments may only be edited within 5 minutes of posting. Report abuses.

  1. Ken Shultz   12 years ago

    This doesn't make any sense.

    The dystopian future we're hurling towards is built and maintained by corporations because of the profit motive. ...it only leads to oppression.

    Everybody knows that, so your facts must be wrong.

    This isn't really happening.

  2. Lord Humungus   12 years ago

    Call me Mr. Skeptical, but I can easily imagine Twitter giving NSA the keys to the kingdom - a backdoor view of the data traffic before encryption.

    1. IDPNDNT   12 years ago

      I wouldn't be so sure.

      Twitter has a solid record on protecting its users.

      1. JD the elder   12 years ago

        I'm not buying that. They may have that kind of technical culture, but ultimately things are in the hands of upper management. And if the Feds come to upper management with a court order that says "give us access to everything, or else", the management will bend.

    2. Brett L   12 years ago

      Nah, I think the core IT developer community is coalescing around the Google engineers, "fuck these guys!" manifesto. The idea that a bunch of incompetent blundercrats get back doors into their stuff seems to have sparked some genuine anger. Also, this is a requirement to maintain an international presence. People outside the US are genuinely seeking alternative out-of-US-based solutions.

      1. Ken Shultz   12 years ago

        I think they're afraid of competitors outside the U.S. exploiting the lack of privacy to make users switch to their service.

        If you're a foreign user and privacy is important to you, why would you continue to use a service that's an open book to the NSA?

        1. SweatingGin   12 years ago

          And even if the NSA gets the data or keys and doesn't misuse it (big if), who says they don't accidentally leak it? They just lost gigs of power points explicitly showing all the things they tap. Think they can keep your SSL private key safe? Unlikely.

  3. Mongo   12 years ago

    Those IT companies like to talk tough: I remember around 2000 when the military requested names of teh gayz from online chats and AOL (?) handed over a fuckin' list.

    1. datcv   12 years ago

      AOL HQ in Northern Virginia was too close to the heart of the beast. They never did seem like a very ethical company so... here's hoping that todays tech firms are better?

  4. Fist of Etiquette   12 years ago

    It's good to know that the NSA won't know in October 2014 what I tweeted about Miley Cyrus a year prior.

    1. Brett L   12 years ago

      You laugh, but Twitter has been used in foreign countries to schedule protest, meetings, and anonymously (well, to foreign governments) forward information. I guess you can still tweet: "The Eagle flies at dawn", or whatever your go-code is, too.

      1. SweatingGin   12 years ago

        f7826242aa63ff3e1da63fee2044626e

        1. Brett L   12 years ago

          All I see is blonde, brunette, redhead...

      2. Ken Shultz   12 years ago

        Yeah, and foreign governments have found it easy to identify protestors--and everyone in their family--by tracking Twitter and Facebook, too.

        I wish Twitter all the luck in the world in encrypting their data, but social media, by its very nature, gives authoritarians a framework to trace--that they never had before.

        http://www.amazon.com/The-Net-.....t+delusion

        1. Brett L   12 years ago

          Looks interesting. Thanks for sharing.

      3. Fist of Etiquette   12 years ago

        The chair is against the wall. The chair is against the wall.

        John has a long mustache. John has a long mustache.

        1. jesse.in.mb   12 years ago

          The chair is against the wall. The chair is against the wall.

          That's an absolutely filthy thing to say, FoE, even if it is about Epi's mom.

          1. Brett L   12 years ago

            I was going to make a similar joke about SweatingGin's comment above and lost my nerve. I already have a duel with SugarFree using Wartys as the weapon of choice.

            1. jesse.in.mb   12 years ago

              I already have a duel with SugarFree using Wartys as the weapon of choice.

              Might I suggest that you go into that duel having taken a fairly high dose of muscle relaxers?

  5. db   12 years ago

    Look, all the gov't needs is a regulation, law, or court ruling saying that ephemeral encyption keys are illegal and that any provider of comm services must retain the keys used in any encrypted session.

    Isn't this the basis of why they're going after lavabit for deleting all its data? Destruction of evidence? Just get a law declaring all encryption keys to be potential evidence and requiring long term storage of them, just as financial records are required to be retained for a time period.

    1. Andrew S.   12 years ago

      Yep. That's exactly what I see coming as a result of this.

    2. 0x90   12 years ago

      "all the gov't needs is a secret regulation, law, or court ruling..."

    3. Jerryskids   12 years ago

      all the gov't needs is a regulation, law, or court ruling saying that ephemeral encyption keys are illegal

      I'm pretty sure they already have such a law - hell, these guys would use some obscure provision of the Smoot-Hawley Tariff Act of 1930 to argue that point - but the use of it and the arguments for the use of it are going to be secret. Who knows what sort of pressure is being put on Twitter and Facebook and Google - not to mention Bank of America, MasterCard, GECapital, and so many other information processors - and what sorts of threats of charges for violating secret laws and secret interpretations of laws they face?

    4. andarm16   11 years ago

      Or they can let us win on the encryption front, and just mandate that all actions that users take must be logged as a an anti cyber-bullying measure.

  6. thorax232   12 years ago

    I love Silicon Valley. 🙂

  7. estrauss   12 years ago

    Here's the thing. I think privacy is probably bad. What needs to happen is not that we better hide our shit from the government, but rather that we force the government to be transparent.

    Transparancy, ultimately, is the mechanism that produces the best society. We shouldn't try to act more like them. They should have to act more like us - independent agents engaging in peaceable, free and open exchanges.

Please log in to post comments

Mute this user?

  • Mute User
  • Cancel

Ban this user?

  • Ban User
  • Cancel

Un-ban this user?

  • Un-ban User
  • Cancel

Nuke this user?

  • Nuke User
  • Cancel

Un-nuke this user?

  • Un-nuke User
  • Cancel

Flag this comment?

  • Flag Comment
  • Cancel

Un-flag this comment?

  • Un-flag Comment
  • Cancel

Latest

How Making GLP-1s Available Over the Counter Can Unlock Their Full Potential

Jeffrey A. Singer | From the June 2025 issue

Bob Menendez Does Not Deserve a Pardon

Billy Binion | 5.30.2025 5:25 PM

12-Year-Old Tennessee Boy Arrested for Instagram Post Says He Was Trying To Warn Students of a School Shooting

Autumn Billings | 5.30.2025 5:12 PM

Texas Ten Commandments Bill Is the Latest Example of Forcing Religious Texts In Public Schools

Emma Camp | 5.30.2025 3:46 PM

DOGE's Newly Listed 'Regulatory Savings' for Businesses Have Nothing to Do With Cutting Federal Spending

Jacob Sullum | 5.30.2025 3:30 PM

Recommended

  • About
  • Browse Topics
  • Events
  • Staff
  • Jobs
  • Donate
  • Advertise
  • Subscribe
  • Contact
  • Media
  • Shop
  • Amazon
Reason Facebook@reason on XReason InstagramReason TikTokReason YoutubeApple PodcastsReason on FlipboardReason RSS

© 2024 Reason Foundation | Accessibility | Privacy Policy | Terms Of Use

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

r

Do you care about free minds and free markets? Sign up to get the biggest stories from Reason in your inbox every afternoon.

This field is for validation purposes and should be left unchanged.

This modal will close in 10

Reason Plus

Special Offer!

  • Full digital edition access
  • No ads
  • Commenting privileges

Just $25 per year

Join Today!