,5D-TO-,5D ,5CRYPTION #aa ,PEOPLE 3 ,AU?OR 3 ,CRIME?,9C4 ,TEXT 3 ,IF Y\'VE US$ ! 9T]NET AT ANY PO9T S9CE ,MAY #b#a#c1 Y\'VE PROBABLY HE>D ?AT Y\ %\LD USE 5CRYPT$ COMMUNICATIONS4 ,$W>D ,SN[D5'S REVELATION ?AT ! ,NATIONAL ,SECURITY ,AG5CY LOGS ALL ( \R CALLS1 TEXTS1 & EMAILS SP>K$ A SURGE 9 ! DEVELOPM5T & USE ( 5CRYPTION APPS & S]VICES4 ,ONLY A FEW YE>S LAT]1 5CRYPTION IS WIDELY US$ = DAILY COMMUNICATION4 ,IF Y\ USE ANY ( !SE 5CRYPTION TOOLS1 Y\'VE PROBABLY ALSO HE>D ! PHRASE 05D-TO-5D 5CRYPTION10 OR 0,E#b,E,E40 ,! NAME SEEMS /RAID 5\<3 5D-TO-5D MEANS CONT5T IS 5CRYPT$ FROM ONE 5DPO9T 7G5]ALLY Y\R PHONE OR COMPUT]7 TO ANO!R 5DPO9T 7! PHONE OR COMPUT] ( Y\R MESSAGE'S 9T5D$ RECIPI5T74 ,BUT :AT LEVEL ( SECURITY DOES ?IS PROMISE = Y\1 ! US]8 ,S9CE ! BEG9N+ ( ,TRUMP'S ADM9I/RATION1 ! ,U,S ,CU/OMS & ,BORD] ,PROTECTION 7,C,B,P7 HAS /EPP$ UP ITS 9VASIONS ( TRAVEL]S' PRIVACY4 ,! ,C,B,P HAS BE5 DEM&+ ?AT BO? ,U,S CITIZ5S & VISITORS LOG 9TO !IR PHONES & LAPTOPS & H& !M OV] TO ! ,C,B,P = 9SPECTION4 ,!Y'VE ALSO DEM&$ ?AT TRAVEL]S PROVIDE !IR PASSWORDS OR LOG 9TO !IR SOCIAL M$IA ACC\NTS4 ,TRAVEL]S :O DON'T COMPLY FACE ! ?REAT ( BE+ D5I$ 5TRY4 ,YE/]DAY1 ,WIKILEAKS PUBLI% A TROVE ( LEAK$ ,C,I,A DOCUM5TS 9CLUD+ KN[L$GE ( SECURITY VULN]ABILITIES & EXPLOITS ?AT ! ,C,I,A PAID = & KEPT SECRET FROM ! G5]AL PUBLIC4 ,N[ ?AT ?IS 9=MATION HAS LEAK$1 IT'S NO LONG] JU/ ! ,C,I,A ?AT KN[S !SE VULN]ABILITIES--IT'S EV]YONE4 ,! ,NEW ,YORK ,TIMES & O!RS MISREPORT$ ?AT ! ,C,I,A HAD BROK5 ! 5CRYPTION 9 APPS LIKE ,SIGNAL & ,:ATS,APP1 :5 9 FACT :AT ! ,C,I,A DID WAS T>GET & COMPROMISE SPECIFIC PEOPLE'S ,&ROID DEVICES4 ,9 %ORT1 ?IS REVELATION CONFIRMS ! IMPORTANCE ( US+ 5D-TO-5D 5CRYPT$ COMMUNICATIONS1 :I* H9D] /ATE-LEVEL ACTORS FROM P]=M+ BROAD SPECTRUM DRAGNET SURVEILLANCE4 ,E#b,E,E IS /ILL IMPORTANT4 ,MANY REPORTS >\ND ,VAULT #g HAVE GIV5 ! IMPRESSION ?AT 5CRYPT$ APPS LIKE ,SIGNAL HAVE BE5 COMPROMIS$4 ,9 FACT1 ! COMPROMISE IS AT ! DEVICE LEVEL--AT ! 5DPO9T4 ,!RE IS NO REASON TO BELIEVE ! 5CRYPTION ITSELF DOES NOT WORK4 ,LIMITATIONS3 ,PLA9TEXT ,5DPO9TS ,FIR/1 IT'S IMPORTANT TO UND]/& ?AT IF Y\ CAN READ A MESSAGE1 IT IS PLA9TEXT--?AT IS1 NO LONG] 5CRYPT$4 ,) 5D-TO-5D 5CRYPTION1 ! WEAK L9KS 9 ! SECURITY *A9 >E Y\ & Y\R DEVICE1 & Y\R RECIPI5T & !IR DEVICE4 ,IF Y\R RECIPI5T CAN READ Y\R MESSAGE1 ANYONE ) ACCESS TO !IR DEVICE CAN ALSO READ IT4 ,AN UND]COV] COP C\LD READ Y\R MESSAGE OV] Y\R RECIPI5T'S %\LD]1 OR ! POLICE C\LD CONFISCATE Y\R RECIPI5T'S DEVICE & CRACK IT OP54 ,IF !RE IS ANY RISK ( EI!R ( !SE UN=TUNATE EV5TS TAK+ PLACE1 Y\ %\LD ?9K TWICE BE=E S5D+ ANY?+ Y\ W\LDN'T WANT TO %>E ) ! AU?ORITIES4 ,?IS P>TICUL> LIMITATION IS ALSO RELEVANT TO ! REC5T 0,VAULT #g0 REVEALS1 :I* DEMON/RATE H[ APPS LIKE ,SIGNAL1 ,:ATS,APP1 & ,TELEGRAM MAY NOT BE USEFUL IF AN ADV]S>Y 7LIKE ! ,C,I,A7 GA9S PHYSICAL ACCESS TO Y\R DEVICE OR Y\R CONTACT'S DEVICE & IS ABLE TO UNLOCK IT4 ,MANY REPORTS >\ND ,VAULT #g HAVE BE5 SOME:AT MISLEAD+1 GIV+ ! IMPRESSION ?AT ! APPS !MSELVES HAVE BE5 COMPROMIS$4 ,9 ?IS CASE1 ! COMPROMISE IS AT ! DEVICE LEVEL--AT ! 5DPO9T4 ,! 5CRYPTION ITSELF IS /ILL GOOD4 ,LIMITATIONS3 ,T>GET$ ,SURVEILLANCE ,CONSID]+ ?AT Y\ CAN'T CONTROL ! SECURITY CONDITIONS ( Y\R MESSAGE'S RECIPI5T1 Y\ %\LD CONSID] ! POSSIBILITY ?AT ANY MESSAGE Y\ S5D !M MIE1 !RE >E CASES ( /ATE P[]S T>GET+ PEOPLE ) DIRECT SURVEILLANCE4 ,9 !SE CASES1 T>GETS MAY BE WORK+ ) MALW>E-9FECT$ DEVICES 9T5D$ TO LOG ALL ( !IR 9COM+ & \TGO+ COMMUNICATIONS4 ,?IS COMPROMISE FUNCTIONS AT ! 5DPO9T LEVEL1 R5D]+ ,E#b,E,E USELESS AGA9/ !SE SPECIFIC ADV]S>IES4 ,BECAUSE IT IS DIFFICULT TO KN[ :E!R Y\ 7OR Y\R MESSAGE RECIPI5T7 >E ! T>GET ( ?IS TYPE ( ATTACK1 IT IS ALWAYS BE/ TO DEFAULT TO NOT S5D+ OV]LY-S5SITIVE 9=MATION VIA DIGITAL COMMUNICATIONS4 ,CURR5TLY1 SU* ATTACKS APPE> TO BE R>E1 BUT ONE %\LD NEV] TAKE RISKS NE$LESSLY4 ,LIMITATIONS3 ,METADATA ,! ?IRD ?+ Y\ %\LD KN[ AB\T ,E#b,E,E IS ?AT IT DOESN'T NECESS>ILY PROTECT Y\R METADATA4 ,DEP5D+ ON H[ COMMUNICATIONS >E TRANSMITT$1 LOGS MAY /ILL %[ ! TIME & SIZE ( COMMUNICATION1 AS WELL AS ! S5D] & RECIPI5T4 ,LOGS MAY ALSO %[ ! LOCATION ( BO? S5D] & RECIPI5T AT ! TIME ( COMMUNICATION4 ,:ILE ?IS IS NOT TYPICALLY 5\< TO L& SOMEONE 9 JAIL ON ITS [N1 IT CAN BE USEFUL 9 PROV+ ASSOCIATIONS BETWE5 PEOPLE1 E/ABLI%+ PROXIMITY TO CRIME SC5ES1 & TRACK+ COMMUNICATION PATT]NS4 ,ALL !SE PIECES ( 9=MATION >E USEFUL 9 E/ABLI%+ L>G] BEHAVIORAL PATT]NS 9 CASES ( DIRECT SURVEILLANCE4 ,SO444 ,:Y8 ,SO1 IF 5D-TO-5D 5CRYPTION DOESN'T NECESS>ILY PROTECT ! CONT5T ( Y\R COMMUNICATIONS1 & /ILL GIVES UP USEFUL METADATA1 :AT'S ! PO9T ( US+ IT8 ,ONE ( ! MO/ IMPORTANT ?+S ,E#b,E,E DOES IS 5SURE ?AT Y\R DATA NEV] HITS SOMEONE ELSE'S S]V]S 9 A READABLE =M4 ,S9CE 5D-TO-5D 5CRYPTION />TS FROM ! MOM5T Y\ HIT 0S5D0 & P]SI/S UNTIL IT HITS Y\R RECIPI5T'S DEVICE1 :5 A COMPANY--LIKE ,FACEBOOK--IS SUBPO5A$ = Y\R LOGG$ COMMUNICATIONS1 !Y DO NOT HAVE ANY PLA9TEXT CONT5T TO GIVE UP4 ,?IS PUTS ! AU?ORITIES 9 A POSITION 9 :I* IF !Y WI% TO ACQUIRE ! CONT5T ( Y\R COMMUNICATIONS1 !Y >E =C$ TO SP5D A SIGNIFICANT AM\NT ( TIME & RES\RCES ATTEMPT+ TO BREAK ! 5CRYPTION4 ,9 ! ,UNIT$ ,/ATES1 Y\R RI\ND ! C\NTRY HAVE1 & FREQU5TLY USE1 CELL SITE SIMULATORS KN[N AS 0,I,M,S,I CAT*]S0 OR 0,/+RAYS40 ,I,M,S,I CAT*]S PRET5D TO BE CELL T[]S 9 ORD] TO TRICK Y\R PHONE 9TO GIV+ UP ID5TIFY+ 9=MATION1 9CLUD+ Y\R LOCATION4 ,CELL SITE SIMULATORS ALSO GRAB & LOG Y\R COMMUNICATIONS4 ,AS ) O!R ME?ODS ( 9T]CEPTION1 5CRYPTION MEANS ?AT :AT IS RETRIEV$ IS L>GELY USELESS1 UNLESS ! LAW 5=CEM5T AG5CY IS WILL+ TO GO TO ! TR\BLE TO DECRYPT IT4 ,5CRYPTION ,AT ,RE/ ,9 ADDITION TO US+ 5D-TO-5D 5CRYPTION TO PROTECT ! CONT5T ( Y\R MESSAGES :ILE !Y'RE BE+ S5T1 Y\ CAN USE FULL-DISK 5CRYPTION TO PROTECT Y\R 9=MATION :ILE IT'S /OR$ ON Y\R DEVICE4 ,PROP] FULL-DISK 5CRYPTION MEANS ?AT ALL ( ! 9=MATION ON Y\R DEVICE IS 9DECIPH]ABLE )\T Y\R 5CRYPTION KEY 7USUALLY A PASSPHRASE71 CREAT+ A H>D5$ 5DPO9T :I* IS MU* MORE DIFFICULT TO COMPROMISE4 ,AL?\< 5CRYPT+ Y\R 5DPO9TS IS NOT NECESS>ILY PROTECTION AGA9/ SOME ( ! MORE 9SIDI\S ME?ODS ( SURVEILLANCE1 SU* AS MALW>E1 IT CAN PREV5T ADV]S>IES :O GA9 POSSESSION ( Y\R DEVICES FROM PULL+ ANY USEFUL DATA (F ( !M4 ,5D-TO-5D 5CRYPTION IS BY NO MEANS A MAGICAL %IELD AGA9/ SURVEILLANCE BY NATION /ATES OR MALICI\S 9DIVIDUALS1 BUT ,VAULT #g HIGET$ ATTACKS4 ,:5 PAIR$ ) GOOD S5SE1 5CRYPT$ DEVICES1 & O!R SECURITY PRACTICES1 ,E#b,E,E CAN BE A P[]FUL TOOL = SIGNIFICANTLY R$UC+ Y\R ATTACK SURFACE4 ,CONSI/5T1 HABITUAL USE ( 5D-TO-5D 5CRYPTION CAN NULLIFY MANY L[]-TI] ?REATS & MAY EV5 CAUSE SOME HI<]-LEVEL ADV]S>IES TO DECIDE ?AT ATTACK+ Y\ IS SIMPLY NOT WOR? ! EF=T4 7,S\RCE3 ,RETRIEV$ ON #b#bND ,APRIL #bba FROM CRIME?9C4COM47 ,FROM 3 ,!,AN>*I/,LIBR>Y4ORG4 ,*RONOLOGY 3 ,JANU>Y #a#c1 #bbb 3 ,5D-TO-,5D ,5CRYPTION #aa -- ,ADD$4 FILE G5]AT$ FROM 3 HTTP3_/_/REVOLTLIB4COM_/