Nadim Kobeissi

From Wikipedia, the free encyclopedia
Jump to: navigation, search
Nadim Kobeissi
Nadim Kobeissi 2011.jpg
Nadim Kobeissi in 2011
Born 1990 (age 24–25)
Beirut, Lebanon
Residence Montreal, Canada
Education Lebanese American University, Beirut, 2008–2009 (psychology minor)
Concordia University, Montreal 2009–2013 (political science and philosophy)
Occupation Computer programmer
Employer New America Foundation[1]
Known for Cryptocat
Awards 16th Annual Webby Awards Honoree, social media category[2]
Personal website

Nadim Kobeissi (born 1990) is a computer programmer and security researcher based in Montreal, Quebec, Canada.[3] He is known for having developed Cryptocat, an open-source encrypted web chat client, and for founding Anapnea, a public access shell network that he operated between 2007 and 2012. Kobeissi is also known for speaking publicly against Internet censorship and Internet surveillance.[4] He currently serves at the New America Foundation's Open Internet Tools Project.[1][5]

Early life and education[edit]

Kobeissi was born in Beirut, Lebanon. He studied psychology at the Lebanese American University in Beirut from 2008–2009, and graduated with a double major in political science and philosophy at Concordia University in Montreal in 2013.[6]

Research and activism[edit]

In 2010, Kobeissi was one of the earliest supporters of the Bradley Manning Support Network.[7] He organized a march through Montreal in December that year in support of WikiLeaks, ran a WikiLeaks mirror site, and defended WikiLeaks on various Canadian news publications.[8] During 2011 and 2012, Kobeissi hosted CHOMP.FM, a radio program on Internet activism that ran weekly on Montreal's CKUT-FM radio station. The show included guests from the Electronic Frontier Foundation (EFF), security researcher Bruce Schneier, and journalist Glenn Greenwald.[9]

In 2012, Kobeissi presented Cryptocat at the HOPE hacker conference in New York City.[10][11] During the following year, Kobeissi presented Cryptocat-related talks and research at Google's Internet at Liberty conference,[12] Beirut's SHARE conference,[13] the Chaos Computer Club's SIGINT2013 conference,[14] at RightsCon in Rio de Janeiro,[15] and at Republika in Rijeka, Croatia.[16]

In 2013, Kobeissi led an effort known as the Skype Open Letter[17] which brought together more than forty organizations, including the Electronic Frontier Foundation, Reporters Without Borders, and the Open Technology Institute, calling on Microsoft and Skype to release transparency reports regarding Skype monitoring and surveillance. The effort was successful, and Microsoft released its first transparency report shortly after the letter was published.[18]

Kobeissi is also known for discovering a privacy issue in Windows 8, in which the operating system automatically reported to Microsoft what applications users were installing in an insecure fashion. Kobeissi's research was picked up by Gizmodo[19] and Microsoft issued a response.[20] Kobeissi is also a known proponent of browser cryptography[21] and is a member of the W3C's Web Cryptography Working Group.[22]


Detention and entrapment attempt[edit]

Kobeissi was detained and questioned at the U.S. border by the DHS in June 2012 about Cryptocat's censorship resistance. He tweeted about the incident afterwards, resulting in media coverage and a spike in the popularity of Cryptocat.[23][24] Kobeissi was regularly searched and questioned whenever he flew in the U.S. in 2012.[25]

In 2012, the FBI attempted to entrap Kobeissi using Sabu – an American hacker involved with LulzSec, an offshoot of Anonymous – as an undercover informant.[26] Kobeissi responded on his blog: "To all young hackers out there – use your talents for research. Never acquiesce to anything illegal with anyone, even if they do it with you."[27]

Cryptocat vulnerability[edit]

In mid-2013, critical vulnerabilities were discovered and fixed in the Cryptocat application suite,[28][29] potentially exposing prior communication via the chat program for over a year. The vulnerability was limited to group chat and did not affect private one-on-one conversations.[30] The ensuing controversy centered about the technical naïveté of Nadim and others who had worked on the project.[31] Steve Thomas, the security researcher who discovered the vulnerabilities, blogged criticizing Cryptocat as "run by people that don't know crypto, make stupid mistakes, and [does not have] enough eyes [that] are looking at their code to find the bugs."[29][32] However, this comment was removed in more recent versions of Thomas's blog post.

Meanwhile, other security blogs and news sites called the vulnerability a "responsible disclosure" and praised Cryptocat's transparency regarding vulnerabilities and Kobeissi's warnings regarding the experimental nature of the project.[33][34] Adam Caudill, an independent security researcher noted that "[Cryptocat developers] didn't understand the data they were working with. [...] anyone [could] crack the keys in a frighteningly short amount of time."[35] However, Caudill later also stated that even in light of the controversy, "Cryptocat still achieves its basic goal."[36]

Kobeissi himself had been vocal in the past about other services using encryption. In a Forbes online article investigating the security of encrypted storage service MEGA, Kobeissi, who voiced concern along with other security researchers, noted: "It's a nice website, but when it comes to cryptography they seem to have no experience".[37] This made Cryptocat's own vulnerabilities a more high-profile discussion among security researchers. Nevertheless, MEGA eventually adopted Kobeissi's critique and implemented the suggested changes to their cryptographic code delivery methods.[38]

See also[edit]


  1. ^ a b To Tackle Increasing Online Censorship, Surveillance, OpenITP Hires 2 Special Advisors
  2. ^ 16th Annual Webby Awards Official Honorees
  3. ^ Dwyer, Jim (17 April 2012). "Using His Software Skills With Freedom, Not a Big Payout, in Mind". The New York Times. 
  4. ^ How to fight PRISM
  5. ^ For Cryptocat, see:
    • For Anapnea, see:
    • Resumé,, retrieved 12 May 2012.
  6. ^ Resumé, Retrieved 12 May 2012.
  7. ^ Nicks, Denver (2012). Private: Bradley Manning, WikiLeaks, and the Biggest Exposure of Official Secrets in American History. Chicago Review Press, p. 223.
  8. ^ Montreal student hosts mirror WikiLeaks site
  9. ^ For the march, see Shingler, Benjamin (18 December 2010). "Demonstrators march to support WikiLeaks in Montreal", The Canadian Press.
  10. ^ Why Browser Cryptography is Bad and How We Can Make It Great
  11. ^ H#9 video
  12. ^ Netizen Tech: Cryptocat and Commotion
  13. ^ Cryptocat - Nadim Kobeissi
  14. ^ Cryptocat: The Social and Technical Challenges of Making Crypto Accessible to Everyone
  15. ^ A Cryptocat Spring
  16. ^ Nadim Kobeissi: Cryptocat
  17. ^ Open Letter to Skype: From Concerned Privacy Advocates, Internet Activists, Journalists & Other Organizations
  18. ^
  19. ^
  20. ^ Windows 8 sends Microsoft information about every program you install
  21. ^ Thoughts on Critiques of JavaScript Cryptography
  22. ^ Participants in the Web Cryptography Working Group
  23. ^ Detaining Developer At US Border Increases Cryptocat Popularity
  24. ^ Developer’s detention spikes interest in Montreal’s Cryptocat
  25. ^ This Cute Chat Site Could Save Your Life and Help Overthrow Your Government
  26. ^ Sengupta, Somini (12 March 2012). "A Hacker Charms and Disappoints". The New York Times. 
  27. ^ Kobeissi, Nadim (12 March 2012). "On Sabu and FBI Entrapment". 
  28. ^ "DecryptoCat". 
  29. ^ a b DecryptoCat
  30. ^ New Critical Vulnerability in Cryptocat: Details
  31. ^ "Bad kitty! "Rookie mistake" in Cryptocat chat app makes cracking a snap". 
  32. ^ Cryptocat WIDE OPEN, new version a must
  33. ^ Cryptocat 'encrypted' group chats may have been crackable for 7 months
  34. ^ Popular "encrypted chat" service Cryptocat contained a vulnerability for 7 months
  35. ^ Do One Thing Right...
  36. ^ Cryptocat: What Is the Measure...
  37. ^ Researchers Warn: Mega's New Encrypted Cloud Doesn't Keep Its Megasecurity Promises
  38. ^

External links[edit]