端到端加密的实际局限性
The Practical Limitations of End-to-End Encryption

原始链接: https://soatok.blog/2025/03/25/the-practical-limitations-of-end-to-end-encryption/

《大西洋月刊》报道称,特朗普政府意外将他们的编辑杰弗里·戈德堡添加到一个关于军事行动的Signal群聊中。这引发了Signal安全失效的错误说法。作者认为,这些说法误解了端到端加密(E2EE)的意义。E2EE保护用户设备之间消息的机密性和完整性,防止服务器或网络观察者窃听。 然而,E2EE并不能保证对话值得信任,也不能防止意外添加成员到聊天中。更重要的是,E2EE不足以用于机密的军事通信,这需要经过批准的工具和安全的设施,例如SCIF(敏感隔间信息设施)。作者强调,Signal是否适合军事行动与其密码学无关。 作者随后讨论了使用加密的各种动机,包括隐私、访问控制和合规性。他们批评了对后门的需求,强调加密应该主要服务于隐私。最后,他们预测参与者将承担最小的责任,并推测外国干涉可能是造成泄露的原因。

Hacker News 上的一篇讨论帖探讨了端到端加密的实际局限性,尤其是在敏感操作的安全通信方面。帖子标题中提到的原文认为,智能手机应用被批准传输机密信息是不可行的。 一位评论者 (gadilif) 反驳说,现有的消息应用可以通过添加“条件访问”功能来改进。这将基于用户身份(由可信提供商验证)或设备的安全认证来限制对某些聊天的访问,这在企业应用中已经是一种常用的模式。 另一位评论者 (PaulHoule) 告诫不要低估人为错误在操作安全(opsec)中的影响。他们以切·格瓦拉遇刺事件为例,即使是理论上不可破解的加密(一次性密码本)也因使用不当而被攻破,这突显出即使是最强的安全措施,如果用户不遵守最佳实践,也会失效。

原文

Internet discussions about end-to-end encryption are plagued by misunderstandings, misinformation, and some people totally missing the point.

Of course, people being wrong on the Internet isn’t exactly news.

XKCD: Duty Calls

“What do you want me to do? LEAVE? Then they’ll keep being wrong!”

Yesterday, a story in The Atlantic alleged that the Trump Administration accidentally added their editor, Jeffrey Goldberg, to a Signal group chat discussing a military action in Yemen.

This was quickly confirmed to be authentic.

Brian Hughes, the spokesman for the National Security Council, responded two hours later, confirming the veracity of the Signal group. “This appears to be an authentic message chain, and we are reviewing how an inadvertent number was added to the chain,” Hughes wrote.

The Trump Administration Accidentally Texted Me Its War Plans — The Atlantic

In the aftermath of this glorious fuck-up by the Trump administration, I have observed many poorly informed hot takes. Some of these were funny, but others are dangerous: they were trying to promote technologies that claim to be Signal alternatives, as if this whole story was somehow a failure of Signal’s security posture.

Not to put too fine a point on it: Switching to Threema or PGP would not have made a lick of difference. Switching to Matrix would have only helped if you consider “unable to decrypt message” helping.

To understand why, you need a clear understanding of what end-to-end encryption is, what it does, what it protects against, and what it doesn’t protect againt.

Towards A Clear Understanding

Imagine for a moment that you decided to build a dedicated, invite-only app that enables you to chat with your friends. For the sake of argument, let’s assume that your friends use multiple devices (computers, smartphones, tablets, one uses a watch, etc.). Despite this, they aren’t always online.

The simplest way to implement such an app requires an architecture that looks like this:

  • You have an app (or a website) that your friends use to chat with their friends.
    • If it’s a website, it lives in a browser window.
    • If it’s an app, it’s installed on their devices.
  • You have some sort of channel for passing messages between users.
    • This is often a server that the apps or websites connect to, but you can also setup some sort of peer-to-peer infrastructure.

Any additional requirements only add to the complexity. For example, a consistent message history across devices without storing the message history server-side is actually doable, but requires a bit of careful planning.

What’s End-to-End Encryption?

If you were to take this abstract description of a chat app and add end-to-end encryption to it, what you end up doing is encrypting messages with the app such that only your friends can decrypt them, using the app on their own devices.

Thus, the “ends” are the software running on each device (also called “endpoints”).

This is in contrast with transport encryption (which protects messages between your app and the channel, and also from the channel and your friends’ apps, but not from the channel itself) and at-rest encryption (which protects messages on your device when you’re not using it).

How Does End-to-End Encryption Improve Security?

End-to-end encryption (E2EE for short) aims to ensure only the participants added to a conversation can read its contents.

The channel that delivers encrypted messages shouldn’t be able to read them.

Other Internet-enabled devices that can observe your network traffic to/from the chat app shouldn’t be able to read them.

What Doesn’t E2EE Give Us?

For one, just because you’re having a private conversation doesn’t mean you’re having a trustworthy conversation. An encrypted chat with a scammer will not save you from being scammed.

And as we saw with yesterday’s news story, E2EE also doesn’t prevent you from accidentally adding an editor for a newspaper to a group chat.

On Security Clearances and SCIFs

I must be cautious with my wording here, as I have never held a security clearance in my life (and I’ve never aspired to hold one).

Even if a smartphone app was developed tomorrow that successfully boasted better cryptographic security than Signal, it still wouldn’t be an appropriate tool for classified communications for military operations. In fact, I do not foresee any smartphone app ever being approved for this purpose.

Broadly speaking, when politicians describe Signal as a “non-secure” channel, they’re not talking about its cryptographic security at all. Instead, they’re remarking that Signal has not been approved by the US government for this sort of purpose.

Additionally, Signal’s “disappearing messages” feature is fundamentally incompatible with the requirements of governments to preserve documents (even if they’re highly classified).

When government and military officials want to discuss operations, they’re typically required to go into a SCIF (Sensitive Compartmented Information Facility), which ensures:

  1. That they are not being wiretapped. (To this end, mobile phones are not permitted in a SCIF.)
  2. That they can only access information they need access to (thus, compartmented).
  3. That they are discussing information only with other, known individuals with the relevant security clearances.

There’s almost certainly more to SCIFs than just what I listed, but as I said previously, I don’t have any firsthand experience with them. (If that’s what you’re looking for, ask one of the many security industry personalities on social media that advertise prior military experience.)

Point being: SCIFs are the right tool for the job. Smartphone apps like Signal are not.

It is not a failure of Signal (or any other E2EE technology) to not be suitable for military operations.

Quick Recap

End-to-end encryption provides confidentiality and integrity of messages between endpoints in a network.

When implemented correctly, E2EE prevents server software from reading the contents of messages or tampering with them.

E2EE doesn’t protect messages after they’re delivered.

E2EE doesn’t magically make your conversations trustworthy. You could have a totally encrypted, private conversation with the editor of The Atlantic.

E2EE isn’t sufficient for military use, especially when implemented as a smartphone app.

Why Do We Even Encrypt?

Bad takes aside, one area of confusion that occurs frequently when discussing encryption technology is the motive for using it to begin with.

This might sound silly, but there are actually at least three different answers here.

  1. Privacy. This is probably the most obvious one, especially for the sort of people that read my blog.
  2. Access controls. To certain business types, encryption is a means to an end. It ensures that only people with permission can read the data in a way that’s harder to bypass than filesystem permissions.
  3. Compliance. This is the perspective of the sort of person that will store the key and ciphertext in the same database just to claim it’s encrypted at rest to comply with their understanding of (for example, HIPAA) compliance requirements–even if this is, ultimately, security theater.

Speaking from experience, it’s very difficult to convince people in the second and third camps that a cryptographic weakness in their implementation of a protocol is important.

Law enforcement wavers back and worth on end-to-end encryption. Once called the “going dark” problem by the FBI, apps like Signal are now touted as an important security measure for Americans in the wake of salt typhoon. (On that note, I don’t think our telecom systems are robust at all.)

I think it’s reasonable to conclude that, when they’re promoting the use of encryption technology, the US government at large thinks of encryption as a form of access controls rather than privacy. After all, encryption-as-privacy gets in their way.

Furthermore, the recurring demands for “lawful intercept” capabilities (a.k.a. backdoors) is compatible with a “encryption as an access controls mechanism” worldview, while it undermines privacy.

But fuck them, and fuck what they want.

Encryption should be a privacy technology first and foremost.

Always say “No” to backdoors.

As politicians continue to decry the Trump administrations’ use of Signal for military operations, remember that it’s about not using an approved tool for military communications rather than misgivings about the cryptography used by Signal (which I recently reviewed).

Closing Remarks

Anyone who insists that the the real problem in this story is that the cryptographic security of Signal is somehow lacking (compared to that person’s preferred communication software) is either a liar or a fucking moron.

A lot of the people pushing these other apps are really arguing for inferior cryptographic security (as I’ve demonstrated in my previous work on the topic).

Predictions and Speculation

I’ve kept the actual politics content in this blog post light, mostly because social media is oversaturated with opinions already and nobody should care what I think.

And so, feel free to stop reading if you don’t care. Everything before this section was focused on facts, not opinions.

Prediction: None the people that participated in this Signal group chat will face meaningful accountability for their actions. Party loyalty, at any cost, is a mainstay of the current regime.

If anyone does face consequences, at all, it will be the The Atlantic for breaking the news story. And possibly Signal will lose whatever funding they get from the US government in retribution for making the White House look bad.

Speculation: Adding the press to a military group chat after you’ve compromised one of the participants’ smartphones seems like a good disruption tactic if you’re another nation state. Thus, I would not be entirely surprised to learn that this is why Jeffrey Goldberg ended up in the group chat (rather than pure human error by incompetent government officials).

联系我们 contact @ memedata.com