The Dutch police pull convey managed to decrypt a give away of PGP-encrypted messages sent past times criminals using their custom security-focused PGP BlackBerry phones as well as identified several criminals inwards an ongoing investigation.
PGP, or Pretty Good Privacy, an opened upwards rootage end-to-end encryption criterion that tin move used to cryptographically sign emails, files, documents, or entire disk partitions inwards social club to protect them from existence spied on.
You'll move surprised to know how the police pull genuinely decrypted those PGP messages.
In Apr final year, the Dutch Police arrested a 36-year-old man on suspicion of coin laundering as well as interest inwards selling customized BlackBerry Phones alongside the secure PGP-encrypted network to criminals that were involved inwards organized crimes.
At the time, the police pull also seized a server belonging to Ennetcom, the society owned past times Danny Manupassa, which contains information of end-to-end encrypted communications belong to a large give away of criminal groups.
Later, inwards Jan this year, the Dutch investigators claimed they could decrypt emails stored on PGP-encrypted BlackBerry devices using commercially available tools, simply that alone applied to phones inwards possession of authorities.
However, the latest word concerns reading all of the encrypted messages that were on the seized server.
Dutch police pull said they convey accessed to the contents of 3.6 Million messages stored on that server, as well as that they fifty-fifty convey managed to decrypt a give away of messages, despite supposedly existence protected alongside end-to-end encryption, announced Openbaar Ministerie (the Public Prosecution Service) inwards a press release on Thursday.
Decrypting messages gave government access to testify for dozens of criminal investigations into assassinations, drug trafficking, coin laundering, armed robbery, attempted murder as well as other organized crime, which tin atomic number 82 to significant, decisive breakthroughs inwards criminal matters.
But the query remains:
Ennetcom sold around 20,000 encrypted BlackBerry phones that came preloaded alongside a give away of safety features, including PGP email, which plainly agency that the electronic mail content should move protected fifty-fifty if it's intercepted or if government search its server.
However, the Dutch government discovered that the Ennetcom PGP BlackBerry devices routed user communications through its ain infrastructure, a Canadian court filing reads.
And hither the blunder comes into play: The "keys" for the PGP encryption organisation were generated past times the company's server, rather past times the device.
As a result, the Dutch government noticed that the keys to decrypt the PGP encrypted messages on the Ennetcom PGP BlackBerry devices are also stored on Ennetcom's BlackBerry Enterprise Servers.
The government thus discovered a full of 7TB of information on the fundamental server of Ennetcom inwards Canada as well as constitute that it was possible to read encrypted messages on the server.
In answer to the Openbaar Ministerie press release, Ennetcom announced on its website that "the world prosecution has done these seizures nether fake pretenses," based on suspicion of coin laundering alongside the excuse every bit if all the telephone customers are criminals.
PGP, or Pretty Good Privacy, an opened upwards rootage end-to-end encryption criterion that tin move used to cryptographically sign emails, files, documents, or entire disk partitions inwards social club to protect them from existence spied on.
You'll move surprised to know how the police pull genuinely decrypted those PGP messages.
In Apr final year, the Dutch Police arrested a 36-year-old man on suspicion of coin laundering as well as interest inwards selling customized BlackBerry Phones alongside the secure PGP-encrypted network to criminals that were involved inwards organized crimes.
At the time, the police pull also seized a server belonging to Ennetcom, the society owned past times Danny Manupassa, which contains information of end-to-end encrypted communications belong to a large give away of criminal groups.
Later, inwards Jan this year, the Dutch investigators claimed they could decrypt emails stored on PGP-encrypted BlackBerry devices using commercially available tools, simply that alone applied to phones inwards possession of authorities.
However, the latest word concerns reading all of the encrypted messages that were on the seized server.
Dutch police pull said they convey accessed to the contents of 3.6 Million messages stored on that server, as well as that they fifty-fifty convey managed to decrypt a give away of messages, despite supposedly existence protected alongside end-to-end encryption, announced Openbaar Ministerie (the Public Prosecution Service) inwards a press release on Thursday.
Decrypting messages gave government access to testify for dozens of criminal investigations into assassinations, drug trafficking, coin laundering, armed robbery, attempted murder as well as other organized crime, which tin atomic number 82 to significant, decisive breakthroughs inwards criminal matters.
But the query remains:
How did the Police Decrypt the PGP-encrypted Messages?
Ennetcom sold around 20,000 encrypted BlackBerry phones that came preloaded alongside a give away of safety features, including PGP email, which plainly agency that the electronic mail content should move protected fifty-fifty if it's intercepted or if government search its server.
However, the Dutch government discovered that the Ennetcom PGP BlackBerry devices routed user communications through its ain infrastructure, a Canadian court filing reads.
And hither the blunder comes into play: The "keys" for the PGP encryption organisation were generated past times the company's server, rather past times the device.
As a result, the Dutch government noticed that the keys to decrypt the PGP encrypted messages on the Ennetcom PGP BlackBerry devices are also stored on Ennetcom's BlackBerry Enterprise Servers.
The government thus discovered a full of 7TB of information on the fundamental server of Ennetcom inwards Canada as well as constitute that it was possible to read encrypted messages on the server.
In answer to the Openbaar Ministerie press release, Ennetcom announced on its website that "the world prosecution has done these seizures nether fake pretenses," based on suspicion of coin laundering alongside the excuse every bit if all the telephone customers are criminals.
Share This :
comment 0 Comments
more_vert