Encryption of cell phone conversations!!! Signal app for iPhone - a simple and effective way to encrypt phone conversations

New details published almost daily regarding the work of the PRISM electronic intelligence program of the American National Security Agency (NSA) have caused a completely predictable reaction in society.

Citizens of the United States and other countries have begun to become massively interested in various alternative search engines, social networks and other online services that provide for an increased level of confidentiality of communication and anonymity of their users, and in particular encryption.

And given the fact that both Apple and Google have been convicted of involvement in the PRISM program (at least in terms of collecting metadata from Verizon Wireless customers), many mobile users are puzzled by finding ways to protect their smartphones and tablets from excessive attention from intelligence agencies, and simply from prying eyes.

Of course, everything is quite complicated: moving to another website, renewing an agreement with another provider company and buying a new mobile device are not measures that allow you to hide from PRISM.

To protect your personal information, let’s say, at the everyday level, experts recommend using online data encryption in smartphones and tablets.

This method means that before sending the data, it is first encrypted on the outgoing device, and after sending it is decrypted on the receiving device. It sounds a little like a spy. But in practice, online encryption looks less mysterious, works quite efficiently and takes the form of ordinary mobile applications that allow you to transfer data bypassing servers controlled by PRISM.

There are quite a lot of software products that use online encryption, although they are not among the most popular. Here is a small list of mobile applications and services with which your smartphone and/or tablet can much more successfully resist PRISM and other equally unpleasant data collection tracking systems.

Encryption of telephone conversations
  • RedPhone (for Android): a free, open-source program that can encrypt telephone conversations. Of course, RedPhone is effective only when installed on both (or all) mobile devices participating in the conversation. RedPhone works via Wi-Fi or mobile Internet, and not via telephone connection, so the mobile operator cannot access the metadata of the telephone conversation.

  • Silent Phone (for iOS and Android): involves a certain subscription fee, however, unlike RedPhone, it allows cross-platform calls. In Silent Phone, the user is provided with a unique 10-digit number, which can be used in parallel with the regular number of the operator company. For an additional fee, Silent Phone customers can also use their numbers to call third parties, but in this case the conversation will be encrypted one-way.

  • ChatSecure (for iOS) encrypts data transmitted by conversation participants, works with Google Chat and Jabber (* you can download Jabber ), can also be used for cross-platform data transfer.

  • TextSecure (for Android) was developed by the authors of RedPhone and can be used as a replacement for the standard Android application for sending SMS/MMS messages. To protect data, TextSecure must also be installed on all mobile devices participating in the correspondence. It is also worth noting that in its current form, TextSecure allows mobile operators to receive conversation metadata, but the developers promise to solve this problem in the next version of the application.
  • Ekboo (for BlackBerry) is a BlackBerry BBM encryption plugin with a separate TextBomb feature that allows you to send text messages that are automatically deleted after a user-specified time.
Encrypt mobile data

  • Orweb (for Android) - the program was created by specialists from the Guardian Project and recommended for use by the human rights Electronic Frontier Foundation. Orweb is a web browser that uses the free Tor software to bypass network restrictions and encrypt the user's online activity. In other words, Orweb allows you to hide which device is used to surf the web, control cookies and block Flash. In addition, Orweb does not save browsing history. To work more efficiently with Orweb, its developers recommend using Orbot .
  • Onion Browser (for iOS): For just $1, iOS users are given access to the Tor network, as well as the ability to hide their IP address and web activity.
Encryption of email messages

  • Unlocked (for iOS, Android and other OS) can be downloaded and installed as a regular application on any iOS or Android device, where it will function as a plug-in for a standard web browser. Enlocked allows you to send and receive encrypted emails in Gmail, Yahoo, AOL and Outlook. Enlocked is distributed free of charge, the only condition for using the program is that it must be installed on the mobile devices of all participants in the correspondence.

RedPhone is a mobile application for Android that allows you to make encrypted voice calls over Wi-Fi or the mobile Internet using regular phone numbers. RedPhone only encrypts calls between two RedPhone users or between RedPhone and Signal users.

You can call other RedPhone users from the app itself or using the stock Android dialer. RedPhone will automatically prompt you to switch to an encrypted call.

Installing RedPhone

Download and install RedPhone

On your Android phone, launch Google Play store and search for "RedPhone". Select the "RedPhone::Secure Calls" application.

Why can't I download RedPhone without registering on Google Play?

Many would prefer to download RedPhone from sources not associated with Google's Google Play service: there is less risk of substitution or data collection by third parties. Unfortunately, today developers use part of Google's infrastructure to update software and send push messages. The position of the developers (using the example of TextSecure) is outlined here.

Click "Install" and accept the "Terms of Use" by clicking "Accept". The program will be automatically downloaded and installed.

Register your mobile number

After the installation is complete, open the RedPhone program. You will be asked to register your mobile phone number.

Once you complete your phone number registration, RedPhone will send you a verification code via SMS. This way the program can make sure that the number really belongs to you. When prompted, enter the code you received. You have successfully installed RedPhone and are ready to make encrypted calls!

Using RedPhone

To use RedPhone for calls, the person you want to call must also have RedPhone (or Signal) installed on their mobile phone. If you try to call a person who does not have a RedPhone, the program will offer to send an SMS invitation to the interlocutors to use the RedPhone service, but you will not (yet) be able to call from RedPhone.

When you call another RedPhone or Signal user (using the standard dialer or from the app), the program will suggest a random pair of words. This pair will allow you to verify the authenticity of the interlocutor and his keys ( key verification).

The most reliable way to verify the identity of the caller is to use the mentioned pair of words and another communication channel. You can read the words out loud if you know the voice of the interlocutor, but keep in mind that some sophisticated attackers are able to fake the voice. The spoken and written pairs of words must match.

About the bill, which was supposed to prohibit officials from using uncertified mobile devices, since, according to the author of the bill, they pose a threat to national security. Still would! If the American intelligence services knew what our deputies were talking about, then they would understand that they would never defeat our country! After all, if we somehow develop with like this elected, then what will happen to us if adequate people come to the State Duma?..

Last time I looked at various alternatives to the usual iPhones, but they all have one thing in common - you need to give up your usual phone and switch to a new device or carry a second one with you, especially for confidential conversations. Is this convenient? Of course not. That's why I'm in at the very end of the last note and suggested that no one will voluntarily give up their Vertu and iPhone. And then the other day journalists asked me a question - have I heard about Russian headsets for mobile devices that encrypt voice traffic starting immediately from the headset?.. I haven’t heard, but I started digging. Actually, brief results of my digging (without claims to completeness).

So, if we discard the option of ensuring confidentiality on the phone itself (too much dependence on the version of the mobile OS and platform) and using a special telephone device (inconvenient), then we are left with two options for solving the problem:

  • encrypt in the headset itself
  • encrypt in the “layer”, an intermediate crypto-module between the headset and the phone.

Journalists also told me about the first option, mentioning Ruselectronics, which should flood the Russian market with specialized headsets with built-in encryption. But no matter how I searched, I never found a company that was already producing such devices. I thought that this might be the Tula OKB "Oktava", which specializes in producing headsets for security forces, special services, the Ministry of Emergency Situations, etc., but I didn’t find anything related to cryptography from them. There was also a statement from Ruselectronics about the release of cryptomodules for YotaPhone, but it has little to do with headsets - it clearly depends on the platform of the device.

Basically, modern headsets, such as Plantronics or Jabra, encrypt the voice from the microphone to the computer (or other device to which the headset is connected) using the 128-bit E0 algorithm, which is part of the Bluetooth protocol. But this option does not protect the voice connection from subscriber to subscriber. Rather, it is a solution for protecting the wireless connection from the headset to the computer or phone, between which there can be up to 100-120 meters. It is logical to assume that such a channel, in its unprotected version, is easily eavesdropped and therefore requires protection.

I didn’t find any more cryptographic information protection built into headsets. But I found several implementations of the second solution I mentioned. For example, TopSec Mobile from Rode-Schwarz.

This is a hardware device that does not depend on the model of phone or computer it is connected to. Negotiations are conducted either through the TopSec Mobile itself, brought to the mouth during a conversation, or through a headset connected to the crypto module. The only disadvantage of this approach is the presence of a dedicated call management server between subscribers registered on the server. But this is a necessary condition for building distributed interaction systems.


The second device I found was the “GUARD Bluetooth” scrambler from the domestic company LOGOS. Original Soviet device. There is no design as such. The headset is tightly “sewn” into the device and can only be replaced together with the device. But the protection of conversations is guaranteed - the device connects via Bluetooth to a transmitter - a computer or phone (not a word is said about protecting the Bluetooth channel using E0). I haven’t tested the device, but you can find a review of it online. The appearance of "GUARD Bluetooth" in comparison with the same TopSec Mobile gives a very good idea of ​​how domestic and Western CIPFs compare (both in appearance, and in ease of use, and in functionality). But this device does not require any external server to operate - point-to-point operation is possible.

The last solution I'd like to look at is IndependenceKey, which aims to protect various types of interactions between users. Among the protected types of communication is voice communication. However, this device is a kind of intermediate option between an independent crypto module and security software. In particular, a headset is connected to the IndependenceKey module, from which the voice is transmitted, encrypted in the module, but then it goes to software installed on a personal computer, where IndependenceKey is inserted into the USB connector. Connecting it to your phone will be problematic.

These are the solutions. True, none of them are certified, and it is unlikely that they will be. Maybe Ruselectronics will please you with something interesting in the near future?..

Data encryption tools have been around for a long time, but they are all either very expensive or require users to have extensive knowledge of encryption. A group of free and open source software advocates known as Open Whisper Systems hopes to correct this injustice with a new app called Signal.

Signal is said to be the first iOS app designed to provide a simple and effective way to encrypt calls for free.

It is worth noting that Open Whisper Systems has accumulated considerable experience in this area. Many users know Open Whisper Systems as the developer of Android applications RedPhone and TextSecure for encrypting calls and messages, respectively. And now they have decided to prove themselves in the iOS ecosystem.

To encrypt phone conversations, Signal uses the well-proven ZRTP cryptographic protocol and the AES algorithm with a key length of 128 bits. In theory, such protection is more than enough to withstand all currently known attacks organized by anyone, from hackers from the “script kiddy” category to NSA specialists.

Despite the fact that Signal uses end-to-end encryption, the conversation process itself looks familiar. To operate, the application uses the user's phone number; no additional identifiers are required. Essentially, Signal is a VoIP system. The application allows you to organize an encrypted voice communication channel between end subscribers over IP networks, therefore it does not use cellular networks and the minutes provided as part of the tariff plan, but relies on a cellular connection or Wi-Fi networks.

The only indication that a phone conversation between two Signal users is encrypted and immune to man-in-the-middle attacks is a pair of randomly generated words exchanged between the two parties. The user must say these words out loud to the person on the other end of the line for authentication.

The technology underlying the Signal IP telephony service is not new. Noted computer security expert and Open Whisper Systems co-founder Moxie Marlinspike challenged the lack of encryption on smartphones four years ago with the aforementioned Redphone VoIP system for Android.

RedPhone, like Signal, uses the ZRTP protocol, one of whose developers is Philip Zimmerman, creator of the iconic PGP encryption software. Mr. Zimmerman also developed his own implementation of ZRTP for his startup Silent Circle (hello), which sells call and message encryption software for iPhone and Android. However, unlike Open Whisper Systems, Silent Circles' customers are mainly corporate users, who pay the company $20 a month for using Silent Circles' proprietary software. Another benefit of Open Whisper Systems' solution is that Signal users can make secure calls to Redphone users. A Signal user's contact list displays all friends who use Redphone.

It's worth noting that Signal benefits not only from Redphone's existing user base, but also from Redphone's physical infrastructure - a network of servers around the world for routing local calls to reduce latency. In order to reassure users, the development team stated that Signal does not leave metadata and call logs are not stored on the company’s servers. All encryption occurs locally, on the smartphone itself.

Signal offers the same services as Silent Circle, but is completely free, making it the first free iOS call encryption app of its kind. It’s also worth mentioning once again that Signal is distributed as open source. The source code for Signal for iOS is published on Github. The application is still under development and the company invites everyone interested to test it for reliability. It is also reported that this summer the application may support message encryption.

Instead of going the commercial route, Open Whisper Systems has decided to remain independent and is funded through donations and government grants. It is worth noting that within the framework of special US government programs, the well-known anonymous network Tor and the secure messenger Cryptocat are also funded.

Like every new piece of encryption-enabled software, Signal has yet to be fully tested, so don't rely entirely on the app until it's been thoroughly reviewed by a variety of independent security experts. Moxie Marlinspike admits there are always invisible threats, such as vulnerabilities in iPhone software, that could give attackers the ability to eavesdrop on conversations.

The Signal app can be downloaded for free from the app store

When they talk about the risks of using smartphones, they first of all mention malware and the loss (theft) of a smartphone. But there is a threat of eavesdropping on your smartphone and even unauthorized recording of information from the microphone of your smartphone during a meeting. And few people think that in our time a very dangerous threat is the formation of incriminating evidence uttered in your voice.

Modern technical means provide remote activation of the microphone and camera of the phone, which leads to unauthorized wiretapping of conversations and unauthorized photo and video recording. It is possible to isolate the harmonics of a microphone signal from a mobile phone antenna and intercept them before the signal is received by the nearest GSM station. In addition, contactless communication and hacking in the immediate vicinity of mobile phones equipped with NFC (Near Field Communication) modules pose risks.

False base stations

A special device called an “IMSI trap” (International Mobile Subscriber Identity - a unique identifier written in the SIM card) pretends to be a real cellular network base station for nearby mobile phones. This kind of trick is possible because in the GSM standard, a mobile phone is required to authenticate itself at the request of the network, but the network itself (base station) does not have to confirm its authenticity to the phone. Once the mobile phone accepts the IMSI trap as its base station, it can deactivate the subscriber's encryption feature and work with the normal clear signal, passing it on to the real base station.

Today this trick is successfully used by the American police. According to The Wall Street Journal, the US Department of Justice is collecting data from thousands of American citizens' mobile phones through devices that imitate cell towers. These devices, known as dirtboxes, are carried on board Cessna aircraft and are designed to catch people suspected of committing crimes. According to sources familiar with the project, this program has been in service with the U.S. Marshals Service since 2007 and covers most of the country's population.

The 60-centimeter dirtboxes imitate the cell towers of major telecommunications companies and “lure out” the unique registration data of mobile phones. The device's technology allows the operator to collect identification and geolocation information from tens of thousands of mobile phones in just one Cessna flight. However, even the presence of an encryption function on the phone will not prevent this process.

Moreover, with the help of IMSI traps, false calls or SMS can be sent to the phone, for example, with information about a new service of a false operator, which may contain the activation code for the mobile phone microphone. It is very difficult to determine that a mobile phone in standby mode has its microphone turned on, and an attacker can easily hear and record not only conversations on the phone, but also conversations in the room where the mobile phone is located.

Encryption in GSM networks does not help protect communications from interception. Therefore, you need to think in advance about the protection of sent text messages (SMS, various IM messengers) and email messages.

You can record conversations in different ways. So, today there are Trojans that record conversations from the microphone of your PC and images from its video camera. And tomorrow? Tomorrow, I think, corresponding Trojans will appear for smartphones. Fantastic? Not at all.

It is very difficult to protect yourself from eavesdropping devices using software. And if on a PC you can still hope that you don’t have a Trojan, then on a smartphone... And especially indoors... I wouldn’t.

Run outside and talk there? Where is the guarantee that you are not being hunted using a directional microphone?

Today, many executives' favorite smartphone is the iPhone. But do not forget that a very popular method of wiretapping is to give the “victim” a smartphone with pre-configured spyware. Modern smartphones offer many tools for recording conversations and text messages, and it is very easy to hide spyware on the system. Especially if you purchased a so-called reflashed smartphone. The iPhone generally allows you to record everything that happens and upload the resulting archive through built-in services. Agree, a godsend for a spy.

What to do? But this is already a question. The increasingly widespread encryption systems for voice, SMS and e-mail will come to the rescue. And if encryption of e-mail, files, hard drives and other media (flash drives, smartphones, tablets) has been discussed more than once, then encryption of telephone conversations is most often still a novelty.

Encryption problem in GSM networks

When the GSM communication standard was created, it was believed that it was almost impossible to listen to someone else's conversation on GSM networks. At one time, James Moran, director of the unit responsible for the security and protection of the system from fraud at the GSM consortium, stated: “No one in the world has demonstrated the ability to intercept calls on the GSM network. This is a fact... As far as we know, there is no equipment capable of carrying out such an interception.” But is this really true? After all, the main disadvantage of cellular communications, like any radio communication, is the transmission of data via wireless communication channels. The only way to prevent information extraction is to encrypt the data.

The basis of the GSM security system is three secret algorithms, which are disclosed only to equipment suppliers, telecom operators, etc. A3 - authorization algorithm that protects the phone from cloning; A8 is a utility algorithm that generates a cryptokey based on the output of algorithm A3; A5 is an encryption algorithm for digitized speech to ensure confidentiality of negotiations.

Today, two versions of the A5 algorithm are used in GSM networks: A5/1 and A5/2. This division was made possible due to export restrictions on the length of the encryption key in America. As a result, in Western Europe and the USA the A5/1 algorithm is used, and in other countries, including Russia, the A5/2 algorithm is used. Despite the fact that the A5 algorithms were classified, by 1994 their details became known. Today, almost everything is known about GSM encryption algorithms.

A5 implements a stream cipher based on three linear non-uniform shift registers. This cipher has proven itself to be very stable with large register sizes and was used for some time in military communications. A5 uses registers of 19, 22 and 23 bits, which together give a 64-bit key. Despite the fact that the length of the cipher is small, even quite powerful computers cannot crack it “on the fly” (and this is required by the task of wiretapping), i.e., with proper implementation, the GSM communication protocol can have good practical protection.

But! Back in 1992, Order No. 226 of the Ministry of Communications “On the use of communication means to support operational investigative activities of the Ministry of Security of the Russian Federation” established the requirement to ensure full control over subscribers of any means of communication (including mobile). Apparently, this is why in a 64-bit key 10 bits are simply replaced with zeros. In addition, due to numerous design defects, the strength of the cipher is at the 40-bit level, which can easily be broken by any modern computer in a couple of seconds.

Thus, we see that the possibility of listening to any subscriber in GSM networks is not only a reality, but also a norm, a law (in addition to listening, there is an indulgence for determining location, fixing a number and many other “services”).

And the answer to the question of whether it is possible to listen to a GSM network subscriber has been found. Today, there are many programs available on the Internet for hacking the security of GSM communication protocols, using different methods. However, it is worth considering that in order to decrypt, you must first intercept the corresponding signal. There are already about 20 popular types of equipment for listening to traffic in GSM networks in the world.

Falsifying the speech of subscribers with the aim of compromising them

Not only can you be listened to. Your voice can simply be faked by forming sentences that you never spoke. It is extremely difficult to prove later that it is not you. Thus, American scientists from the AT&T laboratory have developed a completely new technology for synthesizing human voices. The program can speak in any voice, based on its preliminary recording. In addition, she copies the intonation and characteristic pronunciation features of the model. The creation of each new synthesized voice takes from 10 to 40 hours. First, the person whose voice they want to convert into computer form is recorded. The voice is then digitized and analyzed. The results are input to the speech synthesis program. The program in its general form is intended to work in call centers as part of text-to-speech software, as well as in automated voice news feeds. And who prevents such software from being used to compromise this or that user? Nobody!

What to do? Again, encryption systems will come to the rescue.

Software encryption. In fact, encryption of telephone conversations most often comes down to the transmission of voice traffic over the Internet in the form of encrypted traffic. Most often, encryption is carried out programmatically using the resources of your smartphone.

Despite the fact that the software method has a number of advantages, it also has a number of disadvantages, which, in my opinion, significantly exceed its advantages.

Advantages of software encryption:

1. ease of installation;

2. use of one smartphone.

Flaws:

1. you need a fairly powerful smartphone to cope with encryption and decryption of the voice stream;

2. additional load on the processor will contribute to faster battery discharge, and since today rare smartphones are able to work for more than a day in talk mode, this will lead to the fact that you will have to constantly charge your smartphone;

3. risks of using malware;

4. the need to completely irrecoverably erase data on a smartphone before replacing it. In some cases, this is only possible in a service center;

5. slower stream encryption compared to hardware implementation;

6. needs a 3G or higher speed connection, otherwise the quality of the decrypted voice signal drops significantly.

Hardware encryption. At the same time, I would like to note that currently there are already hardware encryptors that are connected via Bluetooth to your phone (in this case, not only a smartphone, but any mobile phone can be used, even without an operating system, the main thing is that it provides a stable connection via Bluetooth).

In this case, the speech is encrypted and decrypted in the corresponding hardware module. Encrypted data is transmitted via Bluetooth to the subscriber's mobile phone and then through the GSM network of the cellular operator to another subscriber. Encryption directly in the hardware module eliminates the interception of unencrypted speech and the possibility of information leakage due to the fault of the cellular operator. Hardware encryptors are invulnerable to malware because they run their own unique OS.

The encrypted speech is transmitted through the GSM network of the cellular operator to the mobile phone of the second subscriber and then via Bluetooth to his encryptor, where decryption occurs. Only the subscriber with whom the conversation is taking place can decrypt the speech, since each subscriber has its own encryption key for communication.

Naturally, this makes speech interception difficult. Moreover, even if the microphone of your smartphone is turned on unauthorized by an external attacker, the hardware encoder also has a microphone suppression function, and the attacker will simply hear white noise instead of a conversation.

Advantages of hardware encryption:

  1. performance;
  2. immunity to malware attacks;
  3. it is impossible to pick up speech signals from a smartphone’s microphone, since during operation the microphone only intercepts white noise generated by the hardware encoder;
  4. does not require smartphone resources, and therefore does not affect its discharge.

Flaws:

  1. you will have to carry two devices in your pocket (the smartphone itself and the encoder);
  2. higher price of hardware encryption compared to software.

The conclusion that can be drawn is: if you have something to hide, and we all have something to hide, you need to either remain silent and not enjoy the benefits of civilization, or think in advance about the possible risks associated with communication.

What type of encryption (software or hardware) you choose is up to you. But this must be decided absolutely consciously.