Feeds

Hushmail open to Feds with court orders

Open secret

The Essential Guide to IT Transformation

US federal law enforcement agencies have obtained access to clear text copies of encrypted emails sent through Hushmail as part a of recent drug trafficking investigation.

The access was only granted after a court order was served on Hush Communications, the Canadian firm that offers the service.

Hush Communications said it would only accede to requests made in respect to targeted accounts and via court orders filed through Canadian court.

Nonetheless, the incident illustrates that Hushmail's marketing claims that not even its own staff can access encrypted email is well wide of the mark.

September court documents (pdf) from a US federal prosecution of alleged steroid dealers reveals that Hush turned over 12 CDs involving emails on three targeted Hushmail accounts, in compliance of court orders made through the mutual assistance treaty between the US and Canada.

Hushmail is widely used by privacy advocates and the security-conscious to send confidential emails. The service uses robust cryptographic and encryption protocols (OpenPGP and AES 256) to scramble the contents of messages stored on its servers, and to exchange encrypted messages with other encrypted email users.

Breaking messages encrypted by the service by brute force would be nigh-on impossible. So how was access to clear-text messages obtained? An investigation by Wired reveals that a server-side encryption option introduced by Hushmail in 2006 means that a copy of a user's passphrase, which gives access to encrypted messages, might be obtained.

"In the case of the alleged steroid dealer, the feds seemed to compel Hushmail to exploit this hole, store the suspects' secret passphrase or decryption key, decrypt their messages, and hand them over," Wired reports.

Brewing up a storm

Hushmail introduced the server-side encryption option because some users found installing and running a Java applet to be slow and annoying. In its original form this Java applet was used to perform the encryption and decryption of messages on a user's computer.

In this scenario, a clear text copy of a message would never hit Hushmail's servers so Hush would only be able to respond to law enforcement requests with scrambled messages, at least in theory. In practice, Hushmail's Java architecture still permits a mechanism for the recovery of scrambled emails in clear-text form.

Brian Smith, chief technology officer of Hushmail, declined to speak about specific law enforcement requests. However he was more forthcoming in explaining the technology implications of Hushmail's server-side encryption options.

"The key point, though, is that in the non-Java configuration, private key and passphrase operations are performed on the server-side. This requires that users place a higher level of trust in our servers as a trade off for the better usability they get from not having to install Java and load an applet," he said.

"This might clarify things a bit when you are considering what actions we might be required to take under a court order. Again, I stress that our requirement in complying with a court order is that we not take actions that would affect users other than those specifically named in the order."

As Wired notes, Hushmail's marketing collateral fails to stress the implications of using the non-Java option. Even the Java option might not be entirely secure. Hush may be obliged to rig the Java applet sent to targeted users with a backdoor designed to capture their passwords, Wired implies.

It explains that "Hushmail's own threat matrix includes this possibility, saying that if an attacker got into Hushmail's servers, they could compromise an account - but that 'evidence of the attack' (presumably the rogue Java applet) could be found on the user's computer."

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.