FIVE CRITICAL MISTAKES TO AVOID When Building Your Next Secure Messaging Solution

Apr 28, 2022 | White Papers

INTRODUCTION: DOING MORE WITH LESS

The whole world is messaging

Providers of secure messaging solutions are working in a very difficult environment. Since the 1990s messaging apps have become prevalent worldwide, with over 3 billion people averaging as many as 72 messages every 24 hours. 1 This staggering number of billions of messages every day shows how popular this means of communication has become. Currently, all messaging apps use a client-server which enables the user to communicate whether one to one, or one to many.

Sensitive data stored

Users sign up and are asked to provide sensitive, personal information that is saved to a server including name, phone number, email address, and in some cases, even date of birth. This is cause for a concern.

Technology remains unchanged

The technology used in connecting operations of secure messaging solutions has remained basically unchanged over the last 30 years, with the use of a centralized servers used for the flow and storage of critical data.

A new perspective

This white paper looks at one way to develop and deliver an approved secure message solution in support of internal and external users, at an affordable cost: by a peer-to-peer (P2P) server-less, decentralized message connection process using Point-to- Point Encryption (P2PE), with messages sent directly from user to user, without an intermediary server.

Save this white paper for later

Cyber Security is National Security

In the past, after providing sensitive, personal data permanently held in a database, the message originator constructs and sends a message, but first it must be sent to the connection server, to make the connection with the recipient.

After queueing the receiver, the server holds the message and any attached media on the server awaiting response. This server involvement is an unnecessary weak link in the system, and where the problems begin.

To help provide security on a messaging app, end-to-end encryption (E2EE) is used with the messages and media files stored on the server, until the receiver gets the message.

As messages currently make their way through centralized servers however, the
stored sensitive, and often personal data of the users, exposes them by default to many risks that of hacked personal data, cybertheft, and violations of privacy.

As cyber threats increase, a movement is growing to decentralize messaging. Messages will be sent directly from user to user without an intermediary with Point-to-Point encryption (P2PE)3.

Managing today’s complex security threats using messaging solutions has become more difficult than ever.

Today personal information is gold

Because of the popularity with secure messaging, it has attracted a darker side to infiltrate and attack any potentially vulnerable weak links. These targets for cyber-attacks include personal sensitive information that are permanently stored on servers, along with any undelivered text and media files on servers for up to 30 days, maybe longer, during attempted delivery.

Weak links are cyber-attack opportunities

In this mobile society, secure messaging solutions are constantly under attack. Secure messaging solutions like WhatsApp the world’s number one most popular messaging app, are used because it is believed they are safe, no one can read your messages or access personal data or attached files except for you, right? Unfortunately, that’s not true, messaging app databases can be hacked!2 By storing this sensitive personal information, the glaring weakness is observed.4 Even with E2EE, all cyber-attacks where critical information and data were breached, stolen, or otherwise compromised, have one thing in common, they employed a server in the middle with E2EE.

What is the weak link?

As designed over 30 years ago with the available technology, it is the server that may hold sensitive personal information and establish the connection to make everything happen. The more computer servers used to hold user data and make connection – the more computer server opportunities for a cyber-attack.

Why another database target?

As written by Jackson Barnett on September 29, 2021, in FEDSCOOP; Rep. Nancy Mace, R-S.C., co-sponsored the House version of a bill that would establish a cybersecurity workforce rotational program that passed the House of Representatives with bipartisan support.5 The bill comes after high-profile cyberattacks against the government, like the SolarWinds hack, have increased the urgency of lawmakers attempting to help agencies recruit and retain cyber talent. “Cyber security is national security.” Mace said in a statement. “In fact, just last year 11 federal agencies were hacked by a group affiliated with Russia. Our cyber security challenges are dramatically increasing.”

E2EE doesn’t eliminate the weak link

To help provide better security, providers of secure messaging solutions have addressed this cumbersome and complex system with the security measure called End-to-End Encryption (E2EE), of data and files passing through a server that must be used to initiate, facilitate, and complete the actual connection between devices. However, this approach continues to fail. For messaging apps, the weak “LINK” is this “SERVER” in the middle – that must “ESTABLISH” the connection of the two devices.

This guide can help

While every project has its challenges, this common-sense guide presents five mistakes we see repeatedly, along with tips on how to avoid each one. We hope this guide will help you to create a new secure messaging solution that meets all your goals and provides a dependable way to communicate free of cyber espionage concerns.

MISTAKE 1: Using the Industry Standard Client-Server Method

Currently, the common approach to construction of a secure messaging solutions is known as a client-server method, which enables a user to communicate. This method obtains the security E2EE standards that helps secure and alleviate concerns of cyber espionage. But there are good reasons to rethink this approach.

Valuable data held means time is not on your side

Although E2EE is a secure protocol, the user who wants to send a message, first sends the text or media file to the server. Then the server queues the message on the receiving number and device when they have Internet connection. Once the receiver connects and retrieves the text and/or media file, the server instantly removes them. This helps the server to keep resources to the minimum. The data transfer on all common wireless messaging solutions is an end to end encrypted. This means the server can’t decode and won’t store the messages after delivery. The messages are only decoded when the receiver gets the message.

Client-Server Connection

However, using this server to make the connection between users of Secure messaging, is a critical mistake. As compared to a Peer-to-Peer (P2P) connection, (more on this later), this not only adds an unnecessary database of critical information potentially vulnerable to cyber threats, but it also increases the opportunities for bad actors to infiltrate the connection between the two users, such as using Man in the Middle (MitM) cyber-attack.

Client-Server Network Comparison to Peer-to-Peer Network

The illustration below of the client-server network as compared to a peer-peer (P2P) network, clearly illustrates the profound increase in security of P2P connection, with the absence of a server used to make connections. When a connection is set up directly from one secured wireless device directly to another secured wireless device a dramatic reduction in opportunities for cyber threats is achieved by sharing encrypted data and media. Although E2EE encryption is known to be secure with the client-server architecture, the ability of have a highly functioning secure messaging solution, with the least number of computer components working with each other, is clearly an advantage obtained with a secure peer-to-peer connection, as compared with a client-server model.

Beware of Who or “What’s” Behind the Curtain

As a further example of a potential weakness of the client-server method, at its launch in 2009, WhatsApp was designed to be a simple messaging app that would allow anyone, anywhere to send text messages to their contacts. Facebook acquired WhatsApp in 2014, but at its core, Facebook is an advertising company – it makes its fortune by building extremely detailed profiles about each of its users, and then showing them targeted ads based on their preferences. Originally, WhatsApp users could opt out of data sharing. But from the beginning of this last February, the opt out has been removed and there is nothing you can do to prevent Facebook accessing your account information.4

CONCLUSION: Reduce the ability of bad actors to access important data.

MISTAKE 2: Not Providing Complete Anonymity

A secure messaging solution with users’ identity listed in a database is a key security concern. The problem is all current client-server models of secure messaging solutions require keeping the name, phone number, and sometimes even more personal information in a server about each user. But there are good reasons to rethink this approach.

Requiring too much real information

With most current message solutions such as WhatsApp, the user who wants to send a message, must accept a concerning fact, that multiple aspects of their identity are stored in a database6. The use of ubiquitous client-server architecture used in all popular secure messaging solutions requires user identity data which, when saved and stored on a server supplies a fertile ground for cyber-attacks from bad actors.

CONCLUSION: Don’t Divulge User Identity

MISTAKE 3: Storing Something Valuable to Steal

A secure messaging solution with valuable user data and media files even temporarily stored in a database is a key security concern. The problem with all current client-server models of secure messaging solutions is, the vast amount of required key user data and temporarily held while awaiting connection5 even media files, which can be stolen from a centralized server. But there are good reasons to rethink this approach.

Requiring too much information to be held

With most current message solutions such as WhatsApp, the user who wants to send a message, must accept a concerning fact that use of the service provided, is the information held in a database6. This can include among others:

  • Usage and Log Information
  • Device and Connection Information
  • Location Information
  • Cookies
  • Information Others Provide About You
  • User Reports
  • Third-Party Service Providers
  • Third-Party Service
As previously shown, for the last 30 years the seemingly antiquated use of the ubiquitous client-server architecture requiring retention of key sensitive data and media, supplies fertile ground for cyber-attacks in all popular secure messaging solutions. Again, the obvious answer is to end the need for keeping personal, and other vital files or information on a potentially vulnerable centralized server, to help decrease or stop cyber threats.

CONCLUSION: Centralized Data and File Retention are Cyber Threats

MISTAKE 4: Incorrectly Assuming E2EE is Superior to P2PE

WHAT IS End-to-End ENCRYPTION (E2EE)?

E2EE is the process where data is encrypted while being passed through a network however, the routing information stays visible.

ADVANTAGES OF E2EE

End-to-end encryption (E2EE) is the most used encryption standard for secure communication7. Advantages of E2EE are; it ensures the privacy of our data that we share through the internet using different platforms, and makes it nearly impossible to corrupt messages, documents, and voice messages.

THREATS TO E2EE:

Despite these advantages, E2EE has some distinct disadvantages and threats too.

  • Smartphones are a common medium of communication and hold a huge amount of our data in plaintext. However, E2EE does not secure endpoint communication. Any cyber-attacks on our smartphones, E2EE will not be able to help.
  • E2EE uses public-key cryptography, meaning a secret key and a public key, are both shared with anyone. However, E2EE does not ensure that your device is communicating with the intended receiver’s device. That verification is necessary to ensure that there is no man in the middle attack (MitM) in between.

WHAT IS Point-to-Point ENCRYPTION (P2PE)?

“Point-to-point encryption (P2PE) is the secure encrypting of transacted data through a designated “tunnel. Traditionally up to now, P2PE is most often applied to credit card information encrypted from the merchant point-of-sale (POS) entry to the final credit card processing point. However, the principle of P2PE technology can protect sensitive data in many ways.

ADVANTAGES OF E2EE:

Point-to-Point-Encryption, known to most as P2PE is a standard that is quickly becoming the preferred way for acquirers and merchants to secure customer cardholder data8. Developed in 2012, P2P simplifies how the value chain of in-person payment works for Retailers worldwide. P2PE is considered the benchmark standard for the encryption of credit card payment data within a secure environment using industry standard cryptographic algorithms.

THREATS TO P2PE:

Despite these advantages, P2PE has some distinct disadvantages and threats too8. The need for better security is becoming a major theme in business and government IT. Within P2PE a common retailer standard caused a controversy after some notable data breaches from inside big-retailer systems. Due to non-adequate compliance measurements, there was a data breach. It makes a difference as the breached data was not stolen in the “tunnel” but when it was at rest, stored for future use in networks.

Those organizations that push end-to-end encryption as part of their solutions (to sell more), often claim E2E encryption is safer than P2P encryption. However, evidence clearly shows that P2P encryption seems to be better (from a security standpoint)8. With a required connection point C between systems A and B easily may increase the chance of hacking.

CONCLUSION: Choose P2PE Rather Than E2EE for More Secure Architecture

MISTAKE 5: Not Having FedRAMP Certification

There are four impact levels FedRAMP offered for services with different kinds of risk, based on the potential impacts of a security breach in three different areas9. (“FedRAMP Certification: What Is It, Why It Matters, and Who …”) (“FedRAMP Certification: What Is It, Why It Matters, and Who …”)

  1. Confidentiality: Protections for privacy and proprietary information.
  2. Integrity: Protections against modification or destruction of information.
  3. Availability: Timely and reliable access to data.

The four impact levels are9:

  1. High, based on 421 controls. “The loss of confidentiality, integrity, or availability could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals.” (“FIPS 199, Standards for Security Categorization of Federal …”) “This usually applies to law enforcement, emergency services, financial, and health systems.” (“FedRAMP Certification: What Is It, Why It Matters, and Who …”)
  2. Moderate, based on 325 controls. “The loss of confidentiality, integrity, or availability could be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals.” (“FIPS 199, Standards for Security Categorization of Federal …”) “Nearly 80 percent of approved FedRAMP applications are at the moderate impact level.” (“FedRAMP Certification: What Is It, Why It Matters, and Who …”)
  3. Low, based on 125 controls. “The loss of confidentiality, integrity, or availability could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals.” (“FIPS 199, Standards for Security Categorization of Federal …”)
  4. Low-Impact Software-as-a-Service (LI-SaaS), based on 36 controls. For “systems that are low risk for uses like collaboration tools, project management applications, and tools that help develop open-source code.” This category is also known as FedRAMP Tailored. (“FedRAMP Certification: What Is It, Why It Matters, and Who …”) (“FedRAMP Certification: What Is It, Why It Matters, and Who …”)

The ability to achieve FedRAMP certification is very difficult for a commercial secure messaging solution with E2EE security, using the typical server-in-the-middle-connection to hold sensitive personal, shared data, and media, as the process of achieving FedRAMP authorization can be tough. Interestingly, only Slack, Trello, and Zendesk are FedRAMP certified, with Slack having only a Moderate impact level rating, with both Trello and Zendesk having the lowest Low-Impact level rating, and Zendesk not even offering end-to-end encryption. Interestingly to note, at this time, no secure messaging solution using Point-to-Point Encryption has applied for FedRAMP certification.

CONCLUSION: Very Few Messaging Solutions Have FedRAMP Certification

Save this white paper for later

About 12AX7 Logic:

12AX7 Logic, LLC is a Plymouth, Minnesota-based software company founded in October of 2018. The company was originally formed to provide professional software and related full software-as-a-service (SaaS) components to government defense agencies, and the law enforcement market. As the changing market forces dictated by COVID-19 impacted potential clients’ needs growing, so did 12AX7 Logic’s services expansion of their client services to include secure audio and video communication services along with encrypted, direct wireless messaging and file-sharing capabilities, for specialized legal firms, wealth management, higher education, and high net-worth individuals in professional sports and entertainment.

We use this expertise to produce the first, patented, secure, direct, Peer-to-Peer secure messaging system with Point-to-Point (P2P) encrypted, data-sharing technology sent from one wireless mobile device directly to another wireless mobile device, through a computer interface, over a secured or unsecured DoD or other high-secure network, or supported cellular Network via the Internet.

The first two applicational uses produced with this groundbreaking technology with five awarded patents provide a private, invitation-only, encrypted, communication network directly connecting mobile device users in a secure membership circle. This membership circle enables users the connection and transfer of secure, bank-level encrypted data and all file formats, sent directly between wireless devices through a choice of multiple communication channels including, Bluetooth, WiFi Direct, and the Internet. This highly secure private communication network includes instant messaging, emailing with encrypted attachment, secure audio and video calling, and encrypted file sharing on, private-cloud-based software-as-a-service (SaaS) mobile apps, PENTODETM and TETRODETM.

A truly private, secure, invitation-only communication network to establish contact with participants with a more cost-effective commercial cloud-based Software-as-a-Service (SaaS) that will support the management of Government furnished (GFE) and non-Government owned devices. 12AX7 Logic can provide unique private-cloud technologies to offer lower-cost, highly available, subscription-based, per-user, unclassified GFE and non-Government owned (i.e., personally, or corporately owned) NextGen EMM cloud-based SaaS EMM capabilities to the DoD, or related government and user community. 12AX7 Logic feels this is a better way to accomplish this goal.

COST CONTROL

12AX7 Logic will provide on a Subscription-Based, Per-User licensing model within the stated budget, the design necessary using the ready-to-go-now capability of its PENTODE and TETRODE software to form a basis for the continued necessary programming of a decentralized and distributed security solution to encrypt/decrypt numerous independent data streams so that information can be transmitted between secure areas over unsecure networks to enable incorruptible data communications and resiliency.

For more information contact info@12ax7logic.com.

Learn More About Our Services