Tuesday, October 25, 2016

Whoever Wins the White House, This Year’s Big Loser Is Email

Hackers exploited connected "smart" devices for massive cyberattack to disrupt major websites across U.S.  Private security group says Russia was behind John Podesta’s email hack, email has proven to be an embarrassment of ways to conveniently communicate with one another. Let’s analyze the basic mystery buried in the emails: Why were all these people discussing so much over email in the first place? The answer, of course, is that email is as tempting as it is inescapable, for Mrs. Clinton as well as for the rest of us. More than 50 years after its birth, email exerts an uncanny hold on all of our internal affairs.

The sudden exposure of the Clinton campaign email cache is perhaps the ultimate evidence that we have all overcommitted to email — we have put too much in it, expected too much from it, and now, finally, we are seeing the spectacular signs of its impending destruction.

Email is simply not up to the rigors of modern political and business life. It lulls us into a sense of unguarded security that it never delivers. It entices us to spill our darkest secrets, and then makes those secrets available to any halfway decent hacker. There are several alternatives that could take its place, without the same pitfalls, and the Clinton cache shows why we would be wise to adopt one of them.

What about iMessage?

Let’s pour one out for email, which has had quite a run and move on to something else. Picture yourself, the Clinton campaign uses iMessage to convey news, to set out tactics and strategy, to theorize, to push back, to gossip. It is used in place of phone calls and face-to-face meetings; it is used as a daily calendar and a collaborative whiteboard. Having a single place to discuss everything makes teams more efficient.

Millions and millions of people use iMessage every day. But how many people know exactly what’s going on behind the scenes, or what happens to a message once you send it?
To over simplify it: imagine you have a mail box. This box has two keys. One key lets you drop mail into the mail slot, and one key lets you take mail out. The input key and the pickup key are entirely different; one can never be used to replace the other. You can give away a million copies of your input key, and no one could use it to do anything but put mail in. Unless they find a copy of your pickup key or find a weakness in the way your mailbox was designed, your message is safe.

This is the thinking behind iMessage and public-key cryptography. Your “public key” is like the mail slot key. You can share it with the world, and anyone can encrypt messages to send to you. But the public key only works in one direction. Once a message is encrypted, that public key can’t be used to decrypt it, or reverse the encryption. Once encrypted, your private key (the mail pickup key) is the only way to restore the message to its original readable form.

How iMessage works?

When a user first enables iMessage, your device creates two sets of private and public keys: one set for encrypting data, and one set for signing data (verify that the encrypted text has not been modified after it was sent to the server. If these two things ever do not match up, red flags start going off.)

Your public keys are sent to Apple’s servers. Your private keys are stored on your device. Apple never sees your private keys.

When someone starts an iMessage conversation with you, they fetch your public key(s) from Apple’s servers. Before that message leaves the sender’s device, it’s encrypted into something that only your device knows how to decrypt.

Apple quietly released a document in May 2016 that breaks it all down. 

File Compliance Management for iMessage
Now you can select a shared file created by Ohanae (.oha) from Dropbox from within iMessage, and share your work in-line while you are chatting with teammates.

While the Apple iMessage provides enterprise-grade security for content at rest, those protections stop the moment files are shared, emailed, or downloaded from the iMessage.  That’s where Ohanae steps in to protect your files anywhere they travel, giving you full visibility, control, and assisting your compliance with mandatory government regulations.

Ohanae alleviates data-sovereignty concerns by making it easier to encrypt data and control the encryption.  Eventually, everyone will come to their senses and realize that the real solution for data sovereignty is encryption, not building data centers in various countries.


Download a copy of the Ohanae Technical Overview here: Ohanae for Salesforce on AppExchange