Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Untraceable Messaging Service Raises a Few Eyebrows 236

netbuzz writes "A messaging service called VaporStream announced today at DEMOfall will allow any two parties to communicate electronically without leaving any record of their interaction on any computer or server. Messages cannot be forwarded, edited, printed or saved. After they're read, they're gone."
This discussion has been archived. No new comments can be posted.

Untraceable Messaging Service Raises a Few Eyebrows

Comments Filter:
  • by SomeGuyFromCA ( 197979 ) on Tuesday September 26, 2006 @10:41PM (#16210229) Journal
    Screenshots, anyone?
      • by billstewart ( 78916 ) on Wednesday September 27, 2006 @02:47AM (#16211607) Journal
        Back during the boom, a startup called Disappearing Inc made a similar system for email.
        Their tech guy explained that it was really important to define the problems you're trying to solve and the problems you're *not* trying to solve. If you're trying to help cooperating users communicate privately, you can do it, but if you're trying to prevent uncooperative users from getting around it, that's probably impossible and certainly snake oil at best. They weren't trying to keep the users from breaking the system with some kind of DRM nonsense - they were building something that would let the users make sure that they didn't keep records of their email that they weren't deliberately trying to keep. It's the Ollie North email backups problem, not the Mr. Phelps problem.
    • by edmac3 ( 604659 ) <edsouza AT gmail DOT com> on Tuesday September 26, 2006 @11:19PM (#16210503)
      Sceenshots can be so easily be faked; who would accept screenshots as proof of anything?
      • Re: (Score:2, Insightful)

        by Korin43 ( 881732 )
        Logs can be faked even easier. Your point?
      • Sceenshots can be so easily be faked; who would accept screenshots as proof of anything?
        Well the judges that the RIAA has in their pocket I suppose...
      • That's the slickest backhanded RIAA joke i've seen here in a while. Bravo! :0)
    • Re: (Score:3, Funny)

      by Anonymous Coward
      And the first time anyone anonymously threatens the President using this service, it will end up SO busted... although it will be hard to trace all 4 million of the submitted threats.
    • by firewood ( 41230 ) on Wednesday September 27, 2006 @12:14AM (#16210833)
      Screenshots, anyone?

      Better yet. Run the whole process on virtual machines on a virtual network. Record the virtual state and I/O from outside the virtual machine/network and replay the whole process (including message display and "deletion") at your convenience.

    • by roystgnr ( 4015 ) <royNO@SPAMstogners.org> on Wednesday September 27, 2006 @12:30AM (#16210895) Homepage
      So all this program has to do is encrypt itself with a private key only available to DRM operating systems which support the "no screenshots of me" API. Hole plugged.

      No, the real threat here is from Muslim extremists. I've heard rumors that an Egyptian named Abu Ali Al-Hasan Ibn al-Haitham is working on technology to foil such electronic protection mechanisms. If his "qamara" experiments succeed, all hope of being able to send unsavable or unforwardable messages may be lost.
      • Cameras anyone?
    • by Tim C ( 15259 ) on Wednesday September 27, 2006 @02:05AM (#16211425)
      Screenshots, RAM dumps, network packet dumps, video RAM dumps, running the client (or server, if I'm a rogue admin) in a VM and dumping its RAM, network data, etc; if data enters the RAM of a machine under my control, there's not a whole lot you can do to prevent me from gaining access to it. That might change with trusted computing, secure paths, etc, but even then if I'm determined and skilled enough I can hack the monitor's hardware to intercept the data at the point of display.

      Or hell, I could just take photos of the screen.

      This might well be secure from the average end user, but there will always be someone who can circumvent it, and in the case of a software hack, it only takes one.
      • Photos? Just open emacs, and write it down. Boom, bit for bit copy of the decoded message.

        Somehow I don't think this a form of DRMIM.

      • How can a screenshot prove who you're communicating with? Oh noes! Someone saved a screenshot of a chat between dudethisiscool0342 and Whistleblower45345. Whistleblower can go on and on about having a screenshot that proves! the company is hiding money for its board members... Yeah? And what good will that screenshot be? "You honor, clearly dudethisiscool10342 is the company president... because we've got a screenshot!" Good luck connecting the user with the real person.
      • Screenshots, RAM dumps, network packet dumps, video RAM dumps, running the client (or server, if I'm a rogue admin) in a VM and dumping its RAM, network data, etc; if data enters the RAM of a machine under my control, there's not a whole lot you can do to prevent me from gaining access to it.
        All very complicated. What about just videotaping the monitor?
    • Re: (Score:3, Funny)

      by Mythrix ( 779875 )
      Obviously they're going to put the message over the goatse.cx image. No one will *want* to keep the message after reading it, if they even read it.
    • Re: (Score:3, Funny)

      by Rogerborg ( 306625 )
      The thin film of snake oil coating the message reflects the light from Venus and diffracts it through swamp gas, making screenshots unpossible.
    • Re: (Score:3, Interesting)

      by jbert ( 5149 )
      Just had an interesting thought.

      Scanners, photocopiers and printers already (so I understand) refuse to scan/copy/print images containing the eurion constellation [wikipedia.org].

      If DRM'd images were displayed with a similar type of watermarking, which digital cameras could detect, then that could close off taking photos. (Screenshots themselves won't be possible with the DRM operating system in control - the DRM'd content won't display on screen with an app capable of taking a screenshot).

      OK, so you could get away with fi
  • Screen capture? (Score:3, Insightful)

    by rjamestaylor ( 117847 ) <rjamestaylor@gmail.com> on Tuesday September 26, 2006 @10:41PM (#16210231) Journal
    Come on. If it can be displayed or played it can be captured and preserved. Except for the money spent on such schemes, of course.
    • Re: (Score:3, Insightful)

      Bottom line is what do the producers of the service define as record. If they define the header and message being together as 'record' then separating the two destroys that 'record'. It doesn't mean that the message can't be recorded in some fashion. It's all about the advertising.
    • by EmbeddedJanitor ( 597831 ) on Wednesday September 27, 2006 @03:52AM (#16211899)
      Use colour combos that can't be captured. eg. black on black. Jeez, must I think of everything around here?
      • Much easier: User DRM to ensure that the software only runs on systems without any kind of user I/O. No I/O present, no I/O can be captured.
  • ScatterChat (Score:5, Informative)

    by dshaw858 ( 828072 ) on Tuesday September 26, 2006 @10:43PM (#16210257) Homepage Journal
    I somehow thing that this wouldn't be totally secure. Man in the middle attacks? DNS attacks, spoofing the "web based chat"'s interface? There are lots of ways to mess this up. If I was going for anonymity and protection, I'd use Cult of the Dead Cow's newly released "hacktivism" tool, ScatterChat. It basically uses strong encryption plus Tor (optionally, I think) to make chats as close to perfectly secure as a major chat appliance has come. It's a great idea, many years in the making. I'd go with that, myself.

    - dshaw

    PS: No, I'm neither affiliated with ScatterChat or CDC in any way.
    • Re:ScatterChat (Score:5, Insightful)

      by BoRegardless ( 721219 ) on Tuesday September 26, 2006 @11:14PM (#16210471)
      If I want security, I will be in a noisy open Jeep at 50 mph discussing the secrets with the other person I am communicating with.
      • Re: (Score:2, Insightful)

        by slack-fu ( 940017 )
        Yes but then they can at least see who you are talking to.
      • If I want security, I will be in a noisy open Jeep at 50 mph discussing the secrets with the other person I am communicating with.


        Unless you want the fact that you spoke to a certain person to be secret...
      • by kabocox ( 199019 )
        If I want security, I will be in a noisy open Jeep at 50 mph discussing the secrets with the other person I am communicating with.

        I CAN'T HEAR YOU. CAN YOU SPEAK UP!
    • Re: (Score:3, Funny)

      by Dekortage ( 697532 )

      You're missing the point. VaporStream is ScatterChat, but they are going to change the splash screen.

  • Ctrl + C, Ctrl + V (Score:4, Insightful)

    by Sneaky G ( 945398 ) on Tuesday September 26, 2006 @10:45PM (#16210269)
    How do they know it's been read? Like the others, I'm sure where there's a will, there's a way, through screenshots or something. It's a nice thought, but my mama always told me never to write down anything I didn't want to be shown. You can't always prove what someone said but you can show what someone has written. I know I'm saving a few choice words that could conceivably come back and bite the person who sent the email to me.
    • It's a nice thought, but my mama always told me never to write down anything I didn't want to be shown.

      My mama always told me to eat my vegetables. What exactly did your mama do for a living?

  • One word: (Score:5, Funny)

    by StikyPad ( 445176 ) on Tuesday September 26, 2006 @10:46PM (#16210273) Homepage
    Vaporware.

    Er..
  • by Orange Crush ( 934731 ) on Tuesday September 26, 2006 @10:46PM (#16210277)
    . . . because I'm not sure if it's easy enough to blow this smoke up my butt. Is this massively encrypted? One-time pad? The article says nothing except "no records are kept." Every machine along the path keeps a log of something. At the very least, it can be researched that two machines shouted garbled stuff at each other. How is this any more secure than current encryption methods in place? Do the relevant machines do a secret handshake via gumbyspace?
    • by mrex ( 25183 )
      Well said...this article was way too light on the technical details, and I'm skeptical that this company is just hiding insecurities behind their corporate buzzword. If the system is as secure as they claim, let them tell us how it works.
  • not recordable (Score:3, Insightful)

    by dretay ( 583646 ) <drew&cs,umd,edu> on Tuesday September 26, 2006 @10:46PM (#16210283) Homepage
    If I don't want there to be a record then I talk to the person... in person. Anything else, from phone calls, to letters, to "super secure one time read only" e-mails I assume will be kept for future reference somehow.
  • obligatory (Score:5, Funny)

    by CrazyJim1 ( 809850 ) on Tuesday September 26, 2006 @10:46PM (#16210287) Journal
    A messaging service called VaporStream

    Oh, I thought it said VaporSteam, the gaming service that would allow you to play Duke Nukem Forever.
    • Well you can play Duke Nukem Forever but because there's no record of it you can't prove that you played it or that it's ready.
  • by themushroom ( 197365 ) on Tuesday September 26, 2006 @10:46PM (#16210289) Homepage
    Gee, sounds like text messages and email that your average tech support person sends their customer...

    *ding* "I just received my password! Er, now I can't find it."
  • insecure. (Score:4, Insightful)

    by cranesan ( 526741 ) on Tuesday September 26, 2006 @10:47PM (#16210293)
    Key to Void's Web-based VaporStream service is the fact that at no time does the body of the message and the header information appear together, thus leaving no record of the interaction on any computer or server. The message cannot be forwarded, edited, printed or saved, and, once it's been read, it disappears; nothing is cached anywhere. No attachments allowed. nothing is cached anywhere It might not be cached by the VaptoStream provider, but the ISP (or anyone with a sniffer at the service provider's ISP) can cache both the headers and message informations of all the messages and correlate them later at their leisure. Only an idiot would believe this service gives them "an electronic communications channel that leaves not a trace of its contents or the identities of the participants."
    • by rts008 ( 812749 )
      I was wondering about that also.
      (disclaimer: I'm a n00b and all-unknowing!)
      When I check my e-mail with either evolution (for my cox.net account) or hotmail, I always see who it is from, who/if it has been cc'd or bcc'd, the subject line, and whether there were attatchments.
      So, isn't this all stored together at least at one point?
      With the number of people running Win IE and Outlook, does this null teh whole works at a weak point?
      G-mail and Google Desktop tied in with the above?

      I'm not trying to flame, just a
    • by ShaunC ( 203807 )
      It might not be cached by the VaptoStream provider, but the ISP (or anyone with a sniffer at the service provider's ISP) can cache both the headers and message informations of all the messages and correlate them later at their leisure.
      It's not like this stuff is going to be traversing the wire in the clear. If your ISP can break SSL, you're probably using the wrong ISP...
  • Still traceable? (Score:3, Insightful)

    by mr_neke ( 1001861 ) <eu.neke@gmai l . com> on Tuesday September 26, 2006 @10:48PM (#16210305)
    FTA:
    at no time does the body of the message and the header information appear together
    So, forgive me for sounding naive, but... how is the system supposed to know where the body of the message is supposed to go without a header attached? There'd have to be some kind of link between the two, and even a tenuous link can be used to track where things are going.

    I hereby claim this to still be traceable, even if it is a little more difficult than you would otherwise expect.
    • The body is sent to every IP address. The receiver is bound to be somewhere in there.
    • After being used secretly for years, the RFID chips used by Wal-Mart have leaked from the landfills into the water and from there into our food supply. Now they are in all of our bodies. The current generation of RFIDs has greatly extended range through power derived from use of a coating that functions as a bio-electric fuel cell in the body. RFIDs attached to the optic nerve have been receiving firmware updates from subliminal noise data contained in network television broadcasts and online images. T
    • Well yeah, but they're still technically correct. You enter the user's email address, which then gets sent to VaporStream's servers. They send you back a unique ID, which then gets sent along with your message. So the message and header are kept separate on transmission, and could be on seperate physical servers. That ID is still used to get the message to the recipiant, but the data never appears "together" on a network stream.
  • Making the news (Score:5, Interesting)

    by sporkme ( 983186 ) * on Tuesday September 26, 2006 @10:50PM (#16210323) Homepage
    The article assumes (US govenrment) suspicion and pressure to kill off the project, but neither is cited. This is not news (yet anyway).
    TFA:
    "Good guys need confidentiality, too," notes DEMO Executive Producer Chris Shipley.
    This software sounds pretty damned cool. The article does not discuss specifically end user concern over the loose security (or even outright disclosure) practices of service providers (for profit, etc.) here lately, and I think that this user is the market for this software. People just aren't tickled by the idea of companies databasing and exploiting private conversations for the purpose of ad display. While this is certainly not the first software that is able to address these concerns, this is the first time I have seen it discussed in the context of who may not like it instead of the opposite. No specific information about the mechanics of the system is given.

    While the idea of governmental interest in the personal conversations is not exactly preposterous, there is an awful lot of political hype on the subject. I think that the article could have given some more insight and a lot less innuendo. Potential for controversy does not controversy make. The article is actually bracketed by assumptions.
    Void Communications had better be ready for a call from Department of Homeland Security.
    and
    ...but that's not going to stop people from raising concerns.

    Could not a software roundup have given a little pertintent information in place of all the speculation?
  • by icepick72 ( 834363 ) on Tuesday September 26, 2006 @10:54PM (#16210349)
    I've tried the service and it's so advanced that if I blink it diaappears. Try reading a long letter and it's like having staring contest with a fish. I hope they have patents. This thing is awesome.
  • by Animats ( 122034 ) on Tuesday September 26, 2006 @11:03PM (#16210413) Homepage

    This is just another document DRM system. Microsoft has been shipping this in Office since 2003. They call it "Trustworthy Messaging [microsoft.com]. It includes 128-bit encryption and "content expiration", as Microsoft puts it.

    Nothing new here.

    • by sporkme ( 983186 ) * on Tuesday September 26, 2006 @11:21PM (#16210517) Homepage
      Yeah, the flash demo basically states that it is headerless email, deleted on the sender system when sent, deleted on the server when downloaded, and deleted on the receiver when closed. Stripped headers mean that the sender/recipient combo is not included in the message, but exist temporarily and separately. The message can be compromised but the source cannot be determined at the recipient end, and vice-versa. The article leads one to believe that it is an instant messenger. This sort of thing was done before via anon email. Basically, it seems to be ~post as AC~ then lurk, but for your email. It has always been amusing to me when the word 'trustworthy' appears in a Microsoft title, though.
  • by Anonymous Coward
    My friend, our organization has great need of your service. Will it work in middle eastern countries? How about the mountains of Pakistan? Is there a problem with arabic? We are very excited about your service and look forward to hearing from you are soon as possible. I wish we had access to it several months ago. An unfortunate incident in England could have been avoided.
    • This is /. if you're asking if it supports Unicode then just come right out and say it! No need to be all secretive and obtuse....
    • Funny, but the fact remains that this provides freedom to all groups, including the pro-democracy ones in say China or Iran. I would rather give the people the power to fight for the right cause then give governments the power to suppress what they think is the wrong one.
  • Oh, that's easy to implement. The website calls for a Windoze vulnerability, and 10 seconds after the message is displayed, the computer BSODs...
  • How it works... (Score:3, Informative)

    by chill ( 34294 ) on Tuesday September 26, 2006 @11:29PM (#16210559) Journal
    "How does it work? Using your existing e-mail address, Void says its technology automatically separates the sender's and receiver's names and the date from the body of the message, never allowing them to be seen together: "VaporStream messages cannot be printed, cut and pasted, forwarded or saved, helping promote open and collaborative communications. Once read, VaporStream stream messages are gone forever." The instant a VaporStream stream message is sent, the company says, it is placed in a temporary storage buffer space. "When the recipient logs in to read their message, the message is removed from the buffer space. By the time the recipient opens it, the complete stream message no longer exists on the server or any other computer."

    Anyone can go to the company's web site and sign up for the service at $39.95 per year. It is Web-based, meaning that no hardware or software purchases are required. The company also says that VaporStream is completely immune to spam and viruses."

    I guess their angle is to defend against MITM attacks. If it is web based, it sounds like the sender (Adam) logs in via HTTPS and sends a message to the recipient (Betty). The service adds a unique ID to the message, strips the headers and forwards it on to Betty.

    Security problems that keep the bad guys from using it? The first is the $39.95 per month fee. No sense registering with that credit card 'cause that is tracable. How about sniffing one step upstream from Void's servers for originating IPs. That'll give you who is using it. Then traffic analysis watching for outgoing e-mail messages. If it works with your existing e-mail address then it uses SMTP, which is quite possibly plain text. You can sniff the contents of the message and the recipient. Statistical analysis of the HTTPS traffic just before the SMTP intercept can probably tell you who the sender was.

    Let's not even get into the whole "recent hole in OpenSSL", staging a MITM/DNS poising attack with a proxy or phishing site.

      Charles
  • by saforrest ( 184929 ) on Tuesday September 26, 2006 @11:31PM (#16210573) Journal
    I don't understand all the hype about this here, of all places. Obviously this is well-marketed, but unless I'm deeply misunderstanding something, it would be damned easy to achieve the same result this using various open-source tools. Something like:

    1. Get a Linux box with Apache and some database engine (PostgreSQL or MySQL)
    2. Make a database for user accounts and user messages.
    3. Throw together some web form for users to leave messages for one another. Use SSL for all HTTP requests.
    4. Write a client-side script (Java, maybe even Javascript) for user's machines that
      1. checks for the existence of a new message
      2. displays it when the user is ready, confirming sender using senders's public key
      3. sends authentication to the server that the message was received.
      4. prompts for a response back to the original sender, signing any response using local user's private key

    5. When the server receives authentication of message receipt, delete M.


    Now, there is the issue that the server database is still presumably storing messages on disk, so we aren't matching up to the featured product's boast of never writing messages to disk. Offhand, I don't see a problem with this, since I think we have to trust in the physical integrity of the server. However, there's a simple solution: keep the database on a RAM disk.

    In any case, I think this whole boast of the message never being written to disk is ridiculous, because you have absolutely no assurance that some intermediate machine is not caching it in transit.
    • by Ant P. ( 974313 )
      With most database software you don't even need a RAM disk. You can tell MySQL to store certain tables/DBs in RAM, dunno about Postgres but even SQLite can do it. You'd probably want to wipe the address space afterwards though.
  • by Alric ( 58756 ) <slashdot@ten3.14hundfeld.org minus pi> on Tuesday September 26, 2006 @11:33PM (#16210581) Homepage Journal
    Most of you seem to be missing the point of this system. This is basically a bulletin board system with a special emphasis on deleting all traces of a message as soon as it is read by the recipient.

    This is not a DRM system.

    This system assumes that the sender and the recipient both want to keep the message a secret. Of course somebody can take a screenshot. Or they could just photograph the screen. Or use their brain to remember the message and then their mouth to repeat it. If your big criticsm is that this system doesn't prevent the recipient from reproducing the message, well, please just stop typing.

    The point of this system is that the message itself leave no trail, unlike email or instant messaging. After the message is read, there's no ability to trace the message from the sender to the recipient, and there's very little ability to intercept the message. Sure it can be done, but the right combination of SSL and other precautionary measures should make this a fairly secure experience.

    As I said, this seems to be just a suped-up BBS system. Unless I'm missing something, the technology is really nothing new or exciting. The only new thing here seems to be the marketing package, but they seem to be doing a pretty good job of providing a new service using existing technology.
    • Re: (Score:3, Insightful)

      by Tim C ( 15259 )
      If your big criticsm is that this system doesn't prevent the recipient from reproducing the message, well, please just stop typing.

      I did read the article, in particular this bit:

      The message cannot be forwarded, edited, printed or saved, and, once it's been read, it disappears; nothing is cached anywhere.

      Those of us that you're complaining about are simply pointing out that that claim is incorrect. The message most certainly *can* be saved, it just isn't by default.

  • by DK ( 2203 ) on Tuesday September 26, 2006 @11:37PM (#16210603)
    "The company doesn't see VaporStream being a useful tool for terrorists because it's built for one-to-one conversations, not one to a group."

    Now THAT's a convincing argument.
  • by oohshiny ( 998054 ) on Tuesday September 26, 2006 @11:52PM (#16210711)
    We've had this form of communication for years: it's called "number stations". And that's what you need: an encryption system that the two communicating parties know and understand, together with a public channel that you can broadcast to without being traced.

    Relying on any kind of proprietary service for secure communications is achieving the exact opposite: you have no way of knowing whether these people play by the rules.
  • Digital Fortress... I suppose.
    That book sucked. All Dan Brown books are the same but it's weird that things out of his books happen to make news years later such as this and the mechanical fly incident.
  • Questionable... (Score:2, Insightful)

    You ever wonder if the NSA or CIA is partly behind this? How many backdoors are built into it for the to listen in. Is it open? Can I see? If not, not trustworthy
  • by suv4x4 ( 956391 ) on Wednesday September 27, 2006 @01:07AM (#16211121)
    Tie 'em up, transport them abroad and beat 'em up!

    I mean, why *untraceable* messages unless they're terrorists that ALSO wanna distribute child porn! Sick!

    ------------------

    Now, I've another question: you can't trace the messages, but can you trace the service was used (a protocol, a port? whatever?).

    Because, since you are obviously hiding stuff from CIA and FBI, we plan to make your life a misery, y'know?
  • From RTFA:

    The message cannot be forwarded, edited, printed or saved, and, once it's been read, it disappears; nothing is cached anywhere. No attachments allowed.

    OMG! I'm already using it!! It's my IM client behind our corporate firewall!!!

  • Whether or not the system is secure, can be determined by (1) reading the source code and (2) ensuring that the object code you are actually running matches the source code you read. Closed source software can never be considered secure; but neither can open source software when it is running on an untrusted third party's server.
  • I call "Snake oil" (Score:3, Interesting)

    by querist ( 97166 ) on Wednesday September 27, 2006 @08:00AM (#16213289) Homepage
    I have (just completed) a Ph.D. in Information Security (*), and I have to call "snake oil" on this one. Unless they've managed to re-write TCP and IP or have somehow managed to coordinate a one-time pad encryption key exchange (which, itself, would be loaded with security issues) I cannot see how this will work.

    I suspect that this is intended to give a false sense of security while providing Big Brother a way to watch people who _think_ that their communications are secure. Digital cell phones, anyone? Yes, it is illegal to listen in on the cell phone frequencies in the USA unless you are in law enforcement, but since when are criminals interested in obeying the law except to prevent drawing attention to themselves (e.g. -- don't speed on your way _to_ commit a crime, and don't speed on the way out unless you are already fleeing from someone who spotted you).

    I also suspect that the hype about the government not being pleased with this is inteded to further the false image that this is secure.

    There are ways to communicate securely in the digital age, depending on how you define "securely". The longgevity of the data is critical. Being able to decrypt today's troop movement orders for tomorrow morning after six months' time is not very useful because the data will be useless after tomorrow morning. Being able to decrypt, for example, today's communication about a terror plot to take place on January 20, 2009 (the day the next new President will be sworn into office in the USA for our non-US readers) in six months would be very valuable.

    You cannot make a blanket statement that a system is "secure". A system is only secure for a given use in a given context.

    Again, I have to call "Snake oil" on this one.

    (*) This note was added in response to a comment in the Capacitor thread yesterday about people wanting information from "qualified" individuals, therefore I felt it appropriate to state my qualifications in this area.
  • Sure, almost anything can be traced and tapped. If it gets translated into electronic signal, transmitted sound, or printed word, someone could intercept it. But if its transmitted via vaporware there's nothing to intercept.

    Its perfectly untraceable because it doesn't exist.

Computer programmers do it byte by byte.

Working...