Nadim Kobeissi

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by Magioladitis (talk | contribs) at 19:30, 22 September 2016 (→‎Early life and education: clean up per TfD, removed: <span class="reference-accessdate">, </span> using AWB (12084)). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Nadim Kobeissi
Nadim Kobeissi in 2015
Born1990 (age 33–34)
Beirut, Lebanon
EducationPsychology
Political science
Philosophy
Computer science
Alma materLebanese American University
Concordia University
OccupationResearcher in Computer science
EmployerNew America Foundation[1]
OrganizationFrench Institute for Research in Computer Science and Automation
Known forCryptocat
AwardsWebby Award[2]
Websitehttps://nadim.computer

Nadim Kobeissi (born 1990) is a computer programmer and security researcher based in Montreal, Quebec, Canada.[3] He is known for having developed Cryptocat, an open-source encrypted web chat client, and for founding Anapnea, a public access shell network that he operated between 2007 and 2012. Kobeissi is also known for speaking publicly against Internet censorship and Internet surveillance.[4] He currently serves at the New America Foundation's Open Internet Tools Project.[1][5]

Early life and education

Kobeissi was born in Beirut, Lebanon. He studied psychology at the Lebanese American University in Beirut from 2008–2009, and graduated with a double major in political science and philosophy at Concordia University in Montreal in 2013.[6]

He is now a PhD student studying applied cryptography at the French Institute for Research in Computer Science and Automation (Inria), in France [7] and works at Microsoft Research in Cambridge, United Kingdom.

Research and activism

In 2010, Kobeissi was one of the earliest supporters of the Bradley Manning Support Network.[8] He organized a march through Montreal in December that year in support of WikiLeaks, ran a WikiLeaks mirror site, and defended WikiLeaks on various Canadian news publications.[9] During 2011 and 2012, Kobeissi hosted CHOMP.FM, a radio program on Internet activism that ran weekly on Montreal's CKUT-FM radio station. The show included guests from the Electronic Frontier Foundation (EFF), security researcher Bruce Schneier, and journalist Glenn Greenwald.[10]

In 2012, Kobeissi presented Cryptocat at the HOPE hacker conference in New York City.[11][12] During the following year, Kobeissi presented Cryptocat-related talks and research at Google's Internet at Liberty conference,[13] Beirut's SHARE conference,[14] the Chaos Computer Club's SIGINT2013 conference,[15] at RightsCon in Rio de Janeiro,[16] and at Republika in Rijeka, Croatia.[17]

In 2013, Kobeissi led an effort known as the Skype Open Letter[18] which brought together more than forty organizations, including the Electronic Frontier Foundation, Reporters Without Borders, and the Open Technology Institute, calling on Microsoft and Skype to release transparency reports regarding Skype monitoring and surveillance. The effort was successful, and Microsoft released its first transparency report shortly after the letter was published.[19]

Kobeissi is also known for discovering a privacy issue in Windows 8, in which the operating system automatically reported to Microsoft what applications users were installing in an insecure fashion. Kobeissi's research was picked up by Gizmodo[20] and Microsoft issued a response.[21] Kobeissi is also a known proponent of browser cryptography[22] and is a member of the W3C's Web Cryptography Working Group.[23]

Controversies

Detention and entrapment attempt

Kobeissi was detained and questioned at the U.S. border by the DHS in June 2012 about Cryptocat's censorship resistance. He tweeted about the incident afterwards, resulting in media coverage and a spike in the popularity of Cryptocat.[24][25] Kobeissi was regularly searched and questioned whenever he flew in the U.S. in 2012.[26]

In 2012, the FBI attempted to entrap Kobeissi using Sabu – an American hacker involved with LulzSec, an offshoot of Anonymous – as an undercover informant.[27] Kobeissi responded on his blog: "To all young hackers out there – use your talents for research. Never acquiesce to anything illegal with anyone, even if they do it with you."[28]

Cryptocat vulnerability

In mid-2013, critical vulnerabilities were discovered and fixed in the Cryptocat application suite,[29][30] potentially exposing prior communication via the chat program for over a year. The vulnerability was limited to group chat and did not affect private one-on-one conversations.[31] The ensuing controversy centered on the technical naïveté of Nadim and others who had worked on the project.[32] Steve Thomas, the security researcher who discovered the vulnerabilities, blogged criticizing Cryptocat as "run by people that don't know crypto, make stupid mistakes, and [does not have] enough eyes [that] are looking at their code to find the bugs."[30][33] However, this comment was removed in more recent versions of Thomas's blog post.

Meanwhile, other security blogs and news sites called the vulnerability a "responsible disclosure" and praised Cryptocat's transparency regarding vulnerabilities and Kobeissi's warnings regarding the experimental nature of the project.[34][35] Adam Caudill, an independent security researcher noted that "[Cryptocat developers] didn't understand the data they were working with. [...] anyone [could] crack the keys in a frighteningly short amount of time."[36] However, Caudill later also stated that even in light of the controversy, "Cryptocat still achieves its basic goal."[37]

Kobeissi himself had been vocal in the past about other services using encryption. In a Forbes online article investigating the security of encrypted storage service MEGA, Kobeissi, who voiced concern along with other security researchers, noted: "It's a nice website, but when it comes to cryptography they seem to have no experience".[38] This made Cryptocat's own vulnerabilities a more high-profile discussion among security researchers. Nevertheless, MEGA eventually adopted Kobeissi's critique and implemented the suggested changes to their cryptographic code delivery methods.[39]

Peerio backdoor claims

In January 2016 Kobeissi tweeted his reasons for leaving Peerio, a cloud-based encrypted communications company he co-founded. These centred around potential plans to sell backdoored versions of the Peerio software to certain clients. Peerio soon denied the claims on their own blog.[40]

See also

References

  1. ^ a b To Tackle Increasing Online Censorship, Surveillance, OpenITP Hires 2 Special Advisors
  2. ^ 16th Annual Webby Awards Official Honorees
  3. ^ Dwyer, Jim (17 April 2012). "Using His Software Skills With Freedom, Not a Big Payout, in Mind". The New York Times.
  4. ^ How to fight PRISM
  5. ^ For Cryptocat, see:
    • For Anapnea, see:
    • Resumé, nadim.cc, retrieved 12 May 2012.
  6. ^ Resumé, nadim.cc. Retrieved 12 May 2012.
  7. ^ https://nadim.computer/
  8. ^ Nicks, Denver (2012). Private: Bradley Manning, WikiLeaks, and the Biggest Exposure of Official Secrets in American History. Chicago Review Press, p. 223.
  9. ^ Montreal student hosts mirror WikiLeaks site
  10. ^ For the march, see Shingler, Benjamin (18 December 2010). "Demonstrators march to support WikiLeaks in Montreal", The Canadian Press.
  11. ^ Why Browser Cryptography is Bad and How We Can Make It Great
  12. ^ H#9 video
  13. ^ Netizen Tech: Cryptocat and Commotion
  14. ^ Cryptocat - Nadim Kobeissi
  15. ^ Cryptocat: The Social and Technical Challenges of Making Crypto Accessible to Everyone
  16. ^ A Cryptocat Spring
  17. ^ http://www.republika.io/en/performer/103?width=560&height=80%2525&iframe=true Nadim Kobeissi: Cryptocat
  18. ^ Open Letter to Skype: From Concerned Privacy Advocates, Internet Activists, Journalists & Other Organizations
  19. ^ https://www.eff.org/deeplinks/2013/01/its-time-transparency-reports-become-new-normal
  20. ^ http://gizmodo.com/5937649/windows-8-tells-microsoft-about-everything-you-install-not-very-securely
  21. ^ Windows 8 sends Microsoft information about every program you install
  22. ^ Thoughts on Critiques of JavaScript Cryptography
  23. ^ Participants in the Web Cryptography Working Group
  24. ^ Detaining Developer At US Border Increases Cryptocat Popularity
  25. ^ Developer’s detention spikes interest in Montreal’s Cryptocat
  26. ^ This Cute Chat Site Could Save Your Life and Help Overthrow Your Government
  27. ^ Sengupta, Somini (12 March 2012). "A Hacker Charms and Disappoints". The New York Times.
  28. ^ Kobeissi, Nadim (12 March 2012). "On Sabu and FBI Entrapment". nadim.cc.
  29. ^ "DecryptoCat".
  30. ^ a b DecryptoCat
  31. ^ New Critical Vulnerability in Cryptocat: Details
  32. ^ "Bad kitty! "Rookie mistake" in Cryptocat chat app makes cracking a snap".
  33. ^ Cryptocat WIDE OPEN, new version a must
  34. ^ Cryptocat 'encrypted' group chats may have been crackable for 7 months
  35. ^ Popular "encrypted chat" service Cryptocat contained a vulnerability for 7 months
  36. ^ Do One Thing Right...
  37. ^ Cryptocat: What Is the Measure...
  38. ^ Researchers Warn: Mega's New Encrypted Cloud Doesn't Keep Its Megasecurity Promises
  39. ^ https://twitter.com/kaepora/status/359684121221537792
  40. ^ Grauer, Yael. "Peerio Co-Founder On Why He Left The Company (Hint: It Had To Do With Admin Backdoors)". Forbes.com. Forbes. Retrieved 9 February 2016.

External links