Nadim Kobeissi

From Wikipedia, the free encyclopedia
Jump to: navigation, search
Nadim Kobeissi
Nadim Kobeissi.jpg
Nadim Kobeissi in 2015
Born 1990 (age 25–26)
Beirut, Lebanon
Residence Paris, France
Education Psychology
Political science
Computer science
Alma mater Lebanese American University
Concordia University
Occupation Researcher in Computer science
Employer New America Foundation[1]
Organization French Institute for Research in Computer Science and Automation
Known for Cryptocat
Awards Webby Award[2]

Nadim Kobeissi (born 1990) is a computer programmer and security researcher based in Montreal, Quebec, Canada.[3] He is known for having developed Cryptocat, an open-source encrypted web chat client, and for founding Anapnea, a public access shell network that he operated between 2007 and 2012. Kobeissi is also known for speaking publicly against Internet censorship and Internet surveillance.[4] He currently serves at the New America Foundation's Open Internet Tools Project.[1][5]

Early life and education[edit]

Kobeissi was born in Beirut, Lebanon. He studied psychology at the Lebanese American University in Beirut from 2008–2009, and graduated with a double major in political science and philosophy at Concordia University in Montreal in 2013.[6]

He is now a PhD student studying applied cryptography at the French Institute for Research in Computer Science and Automation (Inria), in France [7] and works at Microsoft Research in Cambridge, United Kingdom.

Research and activism[edit]

In 2010, Kobeissi was one of the earliest supporters of the Bradley Manning Support Network.[8] He organized a march through Montreal in December that year in support of WikiLeaks, ran a WikiLeaks mirror site, and defended WikiLeaks on various Canadian news publications.[9] During 2011 and 2012, Kobeissi hosted CHOMP.FM, a radio program on Internet activism that ran weekly on Montreal's CKUT-FM radio station. The show included guests from the Electronic Frontier Foundation (EFF), security researcher Bruce Schneier, and journalist Glenn Greenwald.[10]

In 2012, Kobeissi presented Cryptocat at the HOPE hacker conference in New York City.[11][12] During the following year, Kobeissi presented Cryptocat-related talks and research at Google's Internet at Liberty conference,[13] Beirut's SHARE conference,[14] the Chaos Computer Club's SIGINT2013 conference,[15] at RightsCon in Rio de Janeiro,[16] and at Republika in Rijeka, Croatia.[17]

In 2013, Kobeissi led an effort known as the Skype Open Letter[18] which brought together more than forty organizations, including the Electronic Frontier Foundation, Reporters Without Borders, and the Open Technology Institute, calling on Microsoft and Skype to release transparency reports regarding Skype monitoring and surveillance. The effort was successful, and Microsoft released its first transparency report shortly after the letter was published.[19]

Kobeissi is also known for discovering a privacy issue in Windows 8, in which the operating system automatically reported to Microsoft what applications users were installing in an insecure fashion. Kobeissi's research was picked up by Gizmodo[20] and Microsoft issued a response.[21] Kobeissi is also a known proponent of browser cryptography[22] and is a member of the W3C's Web Cryptography Working Group.[23]


Detention and entrapment attempt[edit]

Kobeissi was detained and questioned at the U.S. border by the DHS in June 2012 about Cryptocat's censorship resistance. He tweeted about the incident afterwards, resulting in media coverage and a spike in the popularity of Cryptocat.[24][25] Kobeissi was regularly searched and questioned whenever he flew in the U.S. in 2012.[26]

In 2012, the FBI attempted to entrap Kobeissi using Sabu – an American hacker involved with LulzSec, an offshoot of Anonymous – as an undercover informant.[27] Kobeissi responded on his blog: "To all young hackers out there – use your talents for research. Never acquiesce to anything illegal with anyone, even if they do it with you."[28]

Cryptocat vulnerability[edit]

In mid-2013, critical vulnerabilities were discovered and fixed in the Cryptocat application suite,[29][30] potentially exposing prior communication via the chat program for over a year. The vulnerability was limited to group chat and did not affect private one-on-one conversations.[31] The ensuing controversy centered on the technical naïveté of Nadim and others who had worked on the project.[32] Steve Thomas, the security researcher who discovered the vulnerabilities, blogged criticizing Cryptocat as "run by people that don't know crypto, make stupid mistakes, and [does not have] enough eyes [that] are looking at their code to find the bugs."[30][33] However, this comment was removed in more recent versions of Thomas's blog post.

Meanwhile, other security blogs and news sites called the vulnerability a "responsible disclosure" and praised Cryptocat's transparency regarding vulnerabilities and Kobeissi's warnings regarding the experimental nature of the project.[34][35] Adam Caudill, an independent security researcher noted that "[Cryptocat developers] didn't understand the data they were working with. [...] anyone [could] crack the keys in a frighteningly short amount of time."[36] However, Caudill later also stated that even in light of the controversy, "Cryptocat still achieves its basic goal."[37]

Kobeissi himself had been vocal in the past about other services using encryption. In a Forbes online article investigating the security of encrypted storage service MEGA, Kobeissi, who voiced concern along with other security researchers, noted: "It's a nice website, but when it comes to cryptography they seem to have no experience".[38] This made Cryptocat's own vulnerabilities a more high-profile discussion among security researchers. Nevertheless, MEGA eventually adopted Kobeissi's critique and implemented the suggested changes to their cryptographic code delivery methods.[39]

Peerio backdoor claims[edit]

In January 2016 Kobeissi tweeted his reasons for leaving Peerio, a cloud-based encrypted communications company he co-founded. These centred around potential plans to sell backdoored versions of the Peerio software to certain clients. Peerio soon denied the claims on their own blog.[40]

See also[edit]


  1. ^ a b To Tackle Increasing Online Censorship, Surveillance, OpenITP Hires 2 Special Advisors
  2. ^ 16th Annual Webby Awards Official Honorees
  3. ^ Dwyer, Jim (17 April 2012). "Using His Software Skills With Freedom, Not a Big Payout, in Mind". The New York Times. 
  4. ^ How to fight PRISM
  5. ^ For Cryptocat, see:
    • For Anapnea, see:
    • Resumé,, retrieved 12 May 2012.
  6. ^ Resumé, Retrieved 12 May 2012.
  7. ^
  8. ^ Nicks, Denver (2012). Private: Bradley Manning, WikiLeaks, and the Biggest Exposure of Official Secrets in American History. Chicago Review Press, p. 223.
  9. ^ Montreal student hosts mirror WikiLeaks site
  10. ^ For the march, see Shingler, Benjamin (18 December 2010). "Demonstrators march to support WikiLeaks in Montreal", The Canadian Press.
  11. ^ Why Browser Cryptography is Bad and How We Can Make It Great
  12. ^ H#9 video
  13. ^ Netizen Tech: Cryptocat and Commotion
  14. ^ Cryptocat - Nadim Kobeissi
  15. ^ Cryptocat: The Social and Technical Challenges of Making Crypto Accessible to Everyone
  16. ^ A Cryptocat Spring
  17. ^ Nadim Kobeissi: Cryptocat
  18. ^ Open Letter to Skype: From Concerned Privacy Advocates, Internet Activists, Journalists & Other Organizations
  19. ^
  20. ^
  21. ^ Windows 8 sends Microsoft information about every program you install
  22. ^ Thoughts on Critiques of JavaScript Cryptography
  23. ^ Participants in the Web Cryptography Working Group
  24. ^ Detaining Developer At US Border Increases Cryptocat Popularity
  25. ^ Developer’s detention spikes interest in Montreal’s Cryptocat
  26. ^ This Cute Chat Site Could Save Your Life and Help Overthrow Your Government
  27. ^ Sengupta, Somini (12 March 2012). "A Hacker Charms and Disappoints". The New York Times. 
  28. ^ Kobeissi, Nadim (12 March 2012). "On Sabu and FBI Entrapment". 
  29. ^ "DecryptoCat". 
  30. ^ a b DecryptoCat
  31. ^ New Critical Vulnerability in Cryptocat: Details
  32. ^ "Bad kitty! "Rookie mistake" in Cryptocat chat app makes cracking a snap". 
  33. ^ Cryptocat WIDE OPEN, new version a must
  34. ^ Cryptocat 'encrypted' group chats may have been crackable for 7 months
  35. ^ Popular "encrypted chat" service Cryptocat contained a vulnerability for 7 months
  36. ^ Do One Thing Right...
  37. ^ Cryptocat: What Is the Measure...
  38. ^ Researchers Warn: Mega's New Encrypted Cloud Doesn't Keep Its Megasecurity Promises
  39. ^
  40. ^ Grauer, Yael. "Peerio Co-Founder On Why He Left The Company (Hint: It Had To Do With Admin Backdoors)". Forbes. Retrieved 9 February 2016. 

External links[edit]