
That message of warning, unfortunately, proved prescient, in light of this recent security hole. In the past, he’s said that it would be a tragedy if people were to put themselves in harm’s way by using Cryptocat without a realistic idea of the level of protection it provides. In fact, he said, users may feel an unwarranted sense of security if they believe that it’s uncrackable.įrom the get-go, Kobeissi has taken great pains to add a dollop of reality to the public’s understandable enthusiasm for a free, encrypted web chat service. On Friday, he reiterated that message, saying that Cryptocat isn’t a cure for PRISM-like surveillance. Rather, it’s a fledgling project that should be used with caution and in conjunction with tools such as Tor.

The search for secure, encrypted communications has persisted, of course, up until the present day.Īs it is, it seems as though a day hasn’t gone by since early June in which we haven’t been presented with yet another revelation about pervasive surveillance by the US’s National Security Agency.īut Kobeissi has long warned that Cryptocat is no panacea for surveillance. The level of anger may well have much to do with a false sense of security some have placed in Cryptocat, particularly during the Arab spring, when activists lives were imperiled by their communications.
#Cryptocat cats code#
That period covers seven months, Cryptocat says.Ĭryptocat creator and developer Nadim Kobeissi on Friday took to a live stream, broadcast from the SIGINT show in Germany, to address questions about the security hole from audience members and Twitter.ĭuring his 70-minute discussion, Kobeissi owned up to mistakes, including having hired code auditors rather than cryptographers.īut while he made mistakes, the level of anger he’s getting is “psychologically abusive,” he said. Security expert Steve Thomas, who discovered the hole, wrote on his blog that any users of Cryptocat between 17 October 2011 and 15 June 2013 should assume that their messages were compromised, as well as those of whomever they were talking to.Ĭryptocat, for its part, says that the hole was open from versions 2.0 up until (and not including the latest, fixed version) 2.0.42. The bug has to do with the way key pairs were generated for Cryptocat’s group chat.


#Cryptocat cats update#
On Thursday, the project urged users to update after a security researcher pointed out a vulnerability that may have left group chats easier to crack for the past seven months. Cryptocat is a free, open-source project aimed at providing secure, encrypted online chat.
