<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="http://editors.cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>http://editors.cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1 to 15.
        
  </description>
  
  
  
  
  <image rdf:resource="http://editors.cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/online-censorship-perspectives-from-content-creators-and-comparative-law"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/legal-advocacy-manual"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/digital-rights-guide"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/india2019s-parental-control-directive-and-the-need-to-improve-stalkerware-detection"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/dot2019s-order-to-trace-server-ip-addresses-will-lead-to-unintended-censorship"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/detecting-encrypted-client-hello-ech-blocking"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/openness/security-of-open-source-software-a-survey-of-technical-stakeholders2019-perceptions-and-actions"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/openness/securing-our-dependence-on-code-reuse-in-software"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/openness/Securing%20Our%20Dependence%20on%20Code%20Reuse.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/censorwatch-on-the-implementation-of-online-censorship-in-india"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/comments-on-indea-2.0"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/do-we-really-need-an-app-for-that-examining-the-utility-and-privacy-implications-of-india2019s-digital-vaccine-certificates"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/cis-mozilla-doh-trr"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/investigating-encrypted-dns-blocking-in-india"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/the-state-of-secure-messaging"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="http://editors.cis-india.org/internet-governance/online-censorship-perspectives-from-content-creators-and-comparative-law">
    <title>Online Censorship - Perspectives From Content Creators and Comparative Law</title>
    <link>http://editors.cis-india.org/internet-governance/online-censorship-perspectives-from-content-creators-and-comparative-law</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/online-censorship-perspectives-from-content-creators-and-comparative-law'&gt;http://editors.cis-india.org/internet-governance/online-censorship-perspectives-from-content-creators-and-comparative-law&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>divyank</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2024-08-26T06:55:20Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/legal-advocacy-manual">
    <title>Legal Advocacy Manual</title>
    <link>http://editors.cis-india.org/internet-governance/legal-advocacy-manual</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/legal-advocacy-manual'&gt;http://editors.cis-india.org/internet-governance/legal-advocacy-manual&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>divyank</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2024-07-01T08:15:05Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/digital-rights-guide">
    <title>Digital Rights Guide</title>
    <link>http://editors.cis-india.org/internet-governance/digital-rights-guide</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/digital-rights-guide'&gt;http://editors.cis-india.org/internet-governance/digital-rights-guide&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>divyank</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2024-07-01T08:00:09Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/india2019s-parental-control-directive-and-the-need-to-improve-stalkerware-detection">
    <title>India’s parental control directive and the need to improve stalkerware detection</title>
    <link>http://editors.cis-india.org/internet-governance/blog/india2019s-parental-control-directive-and-the-need-to-improve-stalkerware-detection</link>
    <description>
        &lt;b&gt;We analyse a child-monitoring app being developed by the Indian government and question whether it is an effective way to enact parental controls. We highlight how such monitoring apps are often repurposed for digital stalking and play a role in intimate partner violence. 

We also evaluate the protection provided by antivirus tools in detecting such stalkerware apps and describe how we collected technical evidence to help improve the detection of these apps. &lt;/b&gt;
        
&lt;p&gt;&lt;em&gt;This post was reviewed and edited by Amrita Sengupta.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;span id="docs-internal-guid-c4a151a8-7fff-1d6a-d9e3-7643eb3ccd5b"&gt;Stalkerware is a form of surveillance targeted primarily at partners, employees and children in abusive relationships. These are software tools that enable abusers to spy on a person’s mobile device, allowing them to remotely access all data on the device, including calls, messages, photos, location history, browsing history, app data, and more. Stalkerware apps run hidden in the background without the knowledge or consent of the person being surveilled.[1] Such applications are easily available online and can be installed by anyone with little technical know-how and physical access to the device.&lt;/span&gt;&lt;/p&gt;
&lt;span id="docs-internal-guid-c4a151a8-7fff-1d6a-d9e3-7643eb3ccd5b"&gt;
&lt;/span&gt;&lt;span id="docs-internal-guid-c4a151a8-7fff-1d6a-d9e3-7643eb3ccd5b"&gt;
&lt;p dir="ltr"&gt;News reports indicate that the Ministry of Electronics and Information Technology (MeitY) is supporting the development of an app called “SafeNet”[2] that allows parents to monitor activity and set content filters on children’s devices. Following a directive from the Prime Minister’s office to “incorporate parental controls in data usage” by July 2024, the Internet Service Providers Association of India (ISPAI) has suggested that the app should come preloaded on mobile phones and personal computers sold in the country. The Department of Telecom is also asking schools to raise awareness about such parental control solutions.[3][4]&lt;/p&gt;
&lt;p dir="ltr"&gt;The beta version of the app is available for Android devices on the Google Play Store and advertises a range of functionalities including location access, monitoring website and app usage, call and SMS logs, screen time management and content filtering. The content filtering functionality warrants a separate analysis and this post will only focus on the surveillance capabilities of this app.&lt;/p&gt;
&lt;p dir="ltr"&gt;Applications like Safenet, that do not attempt to hide themselves and claim to operate with the knowledge of the person being surveilled, are sometimes referred to as “watchware”.[5] However, for all practical purposes, these apps are indistinguishable from stalkerware. They possess the same surveillance capabilities and can be deployed in the exact same ways. Such apps sometimes incorporate safeguards to notify users that their device is being monitored. These include persistent notifications on the device’s status bar or a visible app icon on the device’s home screen. However, such safeguards can be circumvented with little effort. The notifications can simply be turned off on some devices and there are third-party Android tools that allow app icons and notifications to be hidden from the device user, allowing watchware to be repurposed as stalkerware and operate secretly on a device. This leaves very little room for distinction between stalkerware and watchware apps.[6] In fact, the developers of stalkerware apps often advertise their tools as watchware, instructing users to only use them for legitimate purposes.&lt;/p&gt;
&lt;p dir="ltr"&gt;Even in cases where stalkerware applications are used in line with their stated purpose of monitoring minors’ internet usage, the effectiveness of a surveillance-centric approach is suspect. Our previous work on children’s privacy has questioned the treatment of all minors under the age of 18 as a homogenous group, arguing for a distinction between the internet usage of a 5-year-old child and a 17-year-old teenager. We argue that educating and empowering children to identify and report online harms is more effective than attempts to surveil them.[7][8] Most smartphones already come with options to enact parental controls on screen time and application usage[9][10], and the need for third-party applications with surveillance capabilities is not justified.&lt;/p&gt;
&lt;p dir="ltr"&gt;Studies and news reports show the increasing role of technology in intimate partner violence (IPV).[11][12] Interviews with IPV survivors and support professionals indicate an interplay of socio-technical factors, showing that abusers leverage the intimate nature of such relationships to gain access to accounts and devices to exert control over the victim. They also indicate the prevalence of “dual-use” apps such as child-monitoring and anti-theft apps that are repurposed by abusers to track victims.[13]&lt;/p&gt;
&lt;p dir="ltr"&gt;There is some data available that indicates the use of stalkerware apps in India. Kaspersky anti-virus’ annual State of Stalkerware reports consistently place India among the top 4 countries with the most number of infections detected by its product, with a few thousand infections reported each year between 2020 and 2023.[14][15][16[17] TechCrunch’s Spyware Lookup Tool, which compiles information from data leaks from more than nine stalkerware apps to notify victims, also identifies India as a hotspot for infections.[18] Avast, another antivirus provider, reported a 20% rise in the use of stalkerware apps during COVID-19 lockdowns.[19] The high rates of incidence of intimate partner violence in India, with the National Family Health Survey reporting that about a third of all married women aged 18–49 years have experienced spousal violence [20], also increases the risk of digitally-mediated abuse.&lt;/p&gt;
&lt;p dir="ltr"&gt;Survivors of digitally-mediated abuse often require specialised support in handling such cases to avoid alerting abusers and potential escalations. As part of our ongoing work on countering digital surveillance, we conducted an analysis of seven stalkerware applications, including two that are based in India, to understand and improve how survivors and support professionals can detect their presence on devices.&lt;/p&gt;
&lt;p dir="ltr"&gt;In some cases, where it is safe to operate the device, antivirus solutions can be of use. Antivirus tools can often identify the presence of stalkerware and watchware on a device, categorising them as a type of malware. We measured how effective various commercial antivirus solutions are at detecting stalkerware applications. Our results, which are detailed in the Appendix, indicate a reasonably good coverage, with six out of the seven apps being flagged as malicious by various antivirus solutions. We found that Safenet, the newest app on the list, was not detected by any antivirus. We also compared the detection results with a similar study conducted in 2019 [21] and found that some newer versions of previously known apps saw lower rates of detection. This indicates that antivirus solutions need to analyse new apps and newer versions of apps more frequently to improve coverage and understand how they are able to evade detection.&lt;/p&gt;
&lt;p dir="ltr"&gt;In cases where the device cannot be operated safely, support workers use specialised forensic tools such as the Mobile Verification Toolkit [22] and Tinycheck [23], which can be used to analyse devices without modifying them. We conducted malware analysis on the stalkerware apps to document the traces they leave on devices and submitted them to an online repository of indicators of compromise (IOCs).[24] These indicators are incorporated in detection tools used by experts to detect stalkerware infections.&lt;/p&gt;
&lt;p dir="ltr"&gt;Despite efforts to support survivors and stop the spread of stalkerware applications, the use of technology in abusive relationships continues to grow.[25] Making a surveillance tool like Safenet available for free, publicising it for widespread use, and potentially preloading it on mobile devices and personal computers sold in the country, is an ill-conceived way to enact parental controls and will lead to an increase in digitally-mediated abuse. The government should immediately take this application out of the public domain and work on developing alternate child protection policies that are not rooted in distrust and surveillance.&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;em&gt;If you are affected by stalkerware there are some resources available here: &lt;br /&gt;&lt;/em&gt;&lt;a href="https://stopstalkerware.org/information-for-survivors/"&gt;https://stopstalkerware.org/information-for-survivors/&lt;/a&gt; &lt;br /&gt;&lt;a href="https://stopstalkerware.org/resources/"&gt;https://stopstalkerware.org/resources/&lt;/a&gt;&lt;/p&gt;
&lt;/span&gt;&lt;strong id="docs-internal-guid-c4a151a8-7fff-1d6a-d9e3-7643eb3ccd5b"&gt;
&lt;br /&gt;
&lt;p dir="ltr"&gt;Appendix&lt;/p&gt;
&lt;/strong&gt;&lt;span id="docs-internal-guid-c4a151a8-7fff-1d6a-d9e3-7643eb3ccd5b"&gt;
&lt;p dir="ltr"&gt;Our analysis covered two apps based in India, SafeNet and OneMonitar, and five other apps, Hoverwatch, TheTruthSpy, Cerberus, mSpy and FlexiSPY. All samples were directly obtained from the developer’s websites. The details of the samples are as follows:&lt;/p&gt;
&lt;/span&gt;&lt;strong id="docs-internal-guid-c4a151a8-7fff-1d6a-d9e3-7643eb3ccd5b"&gt;
&lt;br /&gt;
&lt;div align="left" dir="ltr"&gt;
&lt;table class="grid"&gt;&lt;colgroup&gt;&lt;col width="105"&gt;&lt;col width="101"&gt;&lt;col width="69"&gt;&lt;col width="133"&gt;&lt;col width="192"&gt;&lt;/colgroup&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;Name&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;File name&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;Version&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;Date sample was obtained&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;SHA-1 Hash&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;SafeNet&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;Safenet_Child.apk&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;0.15&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;16th March, 2024&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;d97a19dc2212112353ebd84299d49ccfe8869454&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;OneMonitar&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;ss-kids.apk&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;5.1.9&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;19th March, 2024&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;519e68ab75cd77ffb95d905c2fe0447af0c05bb2&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;Hoverwatch&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;setup-p9a8.apk&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;7.4.360&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;5th March, 2024&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;50bae562553d990ce3c364dc1ecf44b44f6af633&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;TheTruthSpy&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;TheTruthSpy.apk&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;23.24&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;5th March, 2024&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;8867ac8e2bce3223323f38bd889e468be7740eab&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;Cerberus&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;Cerberus_disguised.apk&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;3.7.9&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;4th March, 2024&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;75ff89327503374358f8ea146cfa9054db09b7cb&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;mSpy&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;bt.apk&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;7.6.0.1&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;21st March, 2024&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;f01f8964242f328e0bb507508015a379dba84c07&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;FlexiSPY&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;5009_5.2.2_1361.apk&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;5.2.2&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;26th March, 2024&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;5092ece94efdc2f76857101fe9f47ac855fb7a34&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;/strong&gt;&lt;span id="docs-internal-guid-c4a151a8-7fff-1d6a-d9e3-7643eb3ccd5b"&gt;
&lt;p dir="ltr"&gt;We analysed the network activity of these apps to check what web servers they send their data to. With increasing popularity of Content Delivery Networks (CDNs) and cloud infrastructure, these results may not always give us an accurate idea about where these apps originate, but can sometimes offer useful information:&amp;nbsp;&lt;/p&gt;
&lt;/span&gt;&lt;strong id="docs-internal-guid-c4a151a8-7fff-1d6a-d9e3-7643eb3ccd5b"&gt;
&lt;br /&gt;
&lt;div align="left" dir="ltr"&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Name&lt;/td&gt;
&lt;td&gt;Domain&lt;/td&gt;
&lt;td&gt;IP Address[26]&lt;/td&gt;
&lt;td&gt;Country&lt;/td&gt;
&lt;td&gt;ASN Name and Number&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;SafeNet&lt;/td&gt;
&lt;td&gt;safenet.family&lt;/td&gt;
&lt;td&gt;103.10.24.124&lt;/td&gt;
&lt;td&gt;India&lt;/td&gt;
&lt;td&gt;Amrita Vishwa Vidyapeetham, AS58703&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;OneMonitar&lt;/td&gt;
&lt;td&gt;onemonitar.com&lt;/td&gt;
&lt;td&gt;3.15.113.141&lt;/td&gt;
&lt;td&gt;United States&lt;/td&gt;
&lt;td&gt;Amazon.com, Inc., AS16509&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;OneMonitar&lt;/td&gt;
&lt;td&gt;api.cp.onemonitar.com&lt;/td&gt;
&lt;td&gt;3.23.25.254&lt;/td&gt;
&lt;td&gt;United States&lt;/td&gt;
&lt;td&gt;Amazon.com, Inc., AS16509&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Hoverwatch&lt;/td&gt;
&lt;td&gt;hoverwatch.com&lt;/td&gt;
&lt;td&gt;104.236.73.120&lt;/td&gt;
&lt;td&gt;United States&lt;/td&gt;
&lt;td&gt;DigitalOcean, LLC, AS14061&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Hoverwatch&lt;/td&gt;
&lt;td&gt;a.syncvch.com&lt;/td&gt;
&lt;td&gt;158.69.24.236&lt;/td&gt;
&lt;td&gt;Canada&lt;/td&gt;
&lt;td&gt;OVH SAS, AS16276&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;TheTruthSpy&lt;/td&gt;
&lt;td&gt;thetruthspy.com&lt;/td&gt;
&lt;td&gt;172.67.174.162&lt;/td&gt;
&lt;td&gt;United States&lt;/td&gt;
&lt;td&gt;Cloudflare, Inc., AS13335&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;TheTruthSpy&lt;/td&gt;
&lt;td&gt;protocol-a946.thetruthspy.com&lt;/td&gt;
&lt;td&gt;176.123.5.22&lt;/td&gt;
&lt;td&gt;Moldova&lt;/td&gt;
&lt;td&gt;ALEXHOST SRL, AS200019&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Cerberus&lt;/td&gt;
&lt;td&gt;cerberusapp.com&lt;/td&gt;
&lt;td&gt;104.26.9.137&lt;/td&gt;
&lt;td&gt;United States&lt;/td&gt;
&lt;td&gt;Cloudflare, Inc., AS13335&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;mSpy&lt;/td&gt;
&lt;td&gt;mspy.com&lt;/td&gt;
&lt;td&gt;104.22.76.136&lt;/td&gt;
&lt;td&gt;United States&lt;/td&gt;
&lt;td&gt;Cloudflare, Inc., AS13335&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;mSpy&lt;/td&gt;
&lt;td&gt;mobile-gw.thd.cc&lt;/td&gt;
&lt;td&gt;104.26.4.141&lt;/td&gt;
&lt;td&gt;United States&lt;/td&gt;
&lt;td&gt;Cloudflare, Inc., AS13335&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;FlexiSPY&lt;/td&gt;
&lt;td&gt;flexispy.com&lt;/td&gt;
&lt;td&gt;104.26.9.173&lt;/td&gt;
&lt;td&gt;United States&lt;/td&gt;
&lt;td&gt;Cloudflare, Inc., AS13335&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;FlexiSPY&lt;/td&gt;
&lt;td&gt;djp.bz&lt;/td&gt;
&lt;td&gt;119.8.35.235&lt;/td&gt;
&lt;td&gt;Hong Kong&lt;/td&gt;
&lt;td&gt;HUAWEI CLOUDS, AS136907&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;/strong&gt;&lt;span id="docs-internal-guid-c4a151a8-7fff-1d6a-d9e3-7643eb3ccd5b"&gt;
&lt;p dir="ltr"&gt;To understand whether commercial antivirus solutions are able to categorise stalkerware apps as malicious, we used a tool called VirusTotal, which aggregates checks from over 70 antivirus scanners.[27] We uploaded hashes (i.e. unique signatures) of each sample to VirusTotal and recorded the total number of detections by various antivirus solutions. We compared our results to a similar study by Citizen Lab in 2019 [28] that looked at a similar set of apps to identify changes in detection rates over time.&lt;/p&gt;
&lt;/span&gt;&lt;strong id="docs-internal-guid-c4a151a8-7fff-1d6a-d9e3-7643eb3ccd5b"&gt;
&lt;br /&gt;
&lt;div align="left" dir="ltr"&gt;
&lt;table class="plain"&gt;&lt;colgroup&gt;&lt;col width="148"&gt;&lt;col width="191"&gt;&lt;col width="261"&gt;&lt;/colgroup&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;Product&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;VirusTotal Detections (March 2024)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;VirusTotal Detections (January 2019) (By Citizen Lab)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;SafeNet [29]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;0/67 (0 %)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;N/A&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;OneMonitar [30]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;17/65 (26.1%)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;N/A&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;Hoverwatch&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;24/58 (41.4%)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;22/59 (37.3%)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;TheTruthSpy&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;38/66 (57.6%)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;Cerberus&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;8/62 (12.9%)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;6/63 (9.5%)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;mSpy&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;8/63 (12.7%)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;20/63 (31.7%)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;Flexispy [31]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;18/66 (27.3%)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;34/63 (54.0%)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;/strong&gt;&lt;span id="docs-internal-guid-c4a151a8-7fff-1d6a-d9e3-7643eb3ccd5b"&gt;
&lt;p dir="ltr"&gt;We also checked if Google’s Play Protect service [32], a malware detection tool that is built-in to Android devices using Google’s Play Store. These results were also compared with similar checks performed by Citizen Lab in 2019.&lt;/p&gt;
&lt;/span&gt;&lt;strong id="docs-internal-guid-c4a151a8-7fff-1d6a-d9e3-7643eb3ccd5b"&gt;
&lt;br /&gt;
&lt;div align="left" dir="ltr"&gt;
&lt;table class="plain"&gt;&lt;colgroup&gt;&lt;col width="148"&gt;&lt;col width="191"&gt;&lt;col width="261"&gt;&lt;/colgroup&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;Product&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;Detected by Play Protect (March 2024)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;Detected by Play Protect (January 2019) (By Citizen Lab)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;SafeNet&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;no&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;N/A&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;OneMonitar&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;yes&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;N/A&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;Hoverwatch&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;yes&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;TheTruthSpy&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;yes&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;Cerberus&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;yes&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;no&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;mSpy&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;yes&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;Flexispy&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;yes&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;h1 dir="ltr"&gt;Endnotes&lt;/h1&gt;
&lt;/strong&gt;&lt;span id="docs-internal-guid-c4a151a8-7fff-1d6a-d9e3-7643eb3ccd5b"&gt;
&lt;p dir="ltr"&gt;1. &amp;nbsp;Definition adapted from Coalition Against Stalkerware, &lt;a href="https://stopstalkerware.org/"&gt;https://stopstalkerware.org/&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;2. &amp;nbsp;&lt;a href="https://web.archive.org/web/20240316060649/https://safenet.family/"&gt;https://web.archive.org/web/20240316060649/https://safenet.family/&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;3. &amp;nbsp;&lt;a href="https://www.hindustantimes.com/india-news/itministry-tests-parental-control-app-progress-to-be-reviewed-today-101710702452265.html"&gt;https://www.hindustantimes.com/india-news/itministry-tests-parental-control-app-progress-to-be-reviewed-today-101710702452265.html&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;4. &amp;nbsp;&lt;a href="https://www.hindustantimes.com/india-news/schools-must-raise-awareness-about-parental-control-in-internet-usage-says-dot-101710840561172.html"&gt;https://www.hindustantimes.com/india-news/schools-must-raise-awareness-about-parental-control-in-internet-usage-says-dot-101710840561172.html&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;5. &amp;nbsp;&lt;a href="https://github.com/AssoEchap/stalkerware-indicators/blob/master/README.md"&gt;https://github.com/AssoEchap/stalkerware-indicators/blob/master/README.md&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;6. &amp;nbsp;https://cybernews.com/privacy/difference-between-parenting-apps-and-stalkerware/&lt;/p&gt;
&lt;p dir="ltr"&gt;7. &amp;nbsp;&lt;a href="https://timesofindia.indiatimes.com/blogs/voices/shepherding-children-in-the-digital-age/"&gt;https://timesofindia.indiatimes.com/blogs/voices/shepherding-children-in-the-digital-age/&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;8. &amp;nbsp;&lt;a href="https://blog.avast.com/stalkerware-and-children-avast"&gt;https://blog.avast.com/stalkerware-and-children-avast&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;9. &amp;nbsp;&lt;a href="https://safety.google/families/parental-supervision/"&gt;https://safety.google/families/parental-supervision/&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;10. &amp;nbsp;&lt;a href="https://support.apple.com/en-in/105121"&gt;https://support.apple.com/en-in/105121&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;11. &amp;nbsp;R. Chatterjee et al., "The Spyware Used in Intimate Partner Violence," 2018 IEEE Symposium on Security and Privacy (SP), 2018, pp. 441-458.&lt;/p&gt;
&lt;p dir="ltr"&gt;12. &amp;nbsp;&lt;a href="https://www.computerweekly.com/news/252492575/Use-of-abusive-stalkerware-against-women-skyrocketed-in-2020"&gt;https://www.computerweekly.com/news/252492575/Use-of-abusive-stalkerware-against-women-skyrocketed-in-2020&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;13. &amp;nbsp;D. Freed et al., "Digital technologies and intimate partner violence: A qualitative analysis with multiple stakeholders", PACM: Human-Computer Interaction: Computer-Supported Cooperative Work and Social Computing (CSCW), vol. 1, no. 2, 2017.&lt;/p&gt;
&lt;p dir="ltr"&gt;14. &amp;nbsp;&lt;a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/03/07160820/The-State-of-Stalkerware-in-2023.pdf"&gt;https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/03/07160820/The-State-of-Stalkerware-in-2023.pdf&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;15. &amp;nbsp;&lt;a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2023/03/07152747/EN_The-State-of-Stalkerware_2022.pdf"&gt;https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2023/03/07152747/EN_The-State-of-Stalkerware_2022.pdf&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;16. &amp;nbsp;&lt;a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2022/04/12075509/EN_The-State-of-Stalkerware-2021.pdf"&gt;https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2022/04/12075509/EN_The-State-of-Stalkerware-2021.pdf&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;17. &amp;nbsp;&lt;a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/100/2020/03/25175212/EN_The-State-of-Stalkerware-2020.pdf"&gt;https://media.kasperskycontenthub.com/wp-content/uploads/sites/100/2020/03/25175212/EN_The-State-of-Stalkerware-2020.pdf&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;18. &amp;nbsp;&lt;a href="https://techcrunch.com/pages/thetruthspy-investigation/"&gt;https://techcrunch.com/pages/thetruthspy-investigation/&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;19. &amp;nbsp;https://www.thenewsminute.com/atom/avast-finds-20-rise-use-spying-and-stalkerware-apps-india-during-lockdown-129155&lt;/p&gt;
&lt;p dir="ltr"&gt;20. &amp;nbsp;https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10071919/&lt;/p&gt;
&lt;p dir="ltr"&gt;21. &amp;nbsp;&lt;a href="https://citizenlab.ca/docs/stalkerware-holistic.pdf"&gt;https://citizenlab.ca/docs/stalkerware-holistic.pdf&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;22. &amp;nbsp;https://docs.mvt.re/en/latest/&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;23. &amp;nbsp;https://tiny-check.com/&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;24. &amp;nbsp;&lt;a href="https://github.com/AssoEchap/stalkerware-indicators/pull/125"&gt;https://github.com/AssoEchap/stalkerware-indicators/pull/125&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;25. &amp;nbsp;https://stopstalkerware.org/2023/05/15/report-shows-stalkerware-is-not-declining/&lt;/p&gt;
&lt;p dir="ltr"&gt;26. &amp;nbsp;IP information provided by https://ipinfo.io/&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;27. &amp;nbsp;&lt;a href="https://docs.virustotal.com/docs/how-it-works"&gt;https://docs.virustotal.com/docs/how-it-works&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;28. &amp;nbsp;&lt;a href="https://citizenlab.ca/docs/stalkerware-holistic.pdf"&gt;https://citizenlab.ca/docs/stalkerware-holistic.pdf&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;29. &amp;nbsp;Sample was not known to VirusTotal, it was uploaded at the time of analysis&lt;/p&gt;
&lt;p dir="ltr"&gt;30.&amp;nbsp; Sample was not known to VirusTotal, it was uploaded at the time of analysis&lt;/p&gt;
&lt;p dir="ltr"&gt;31. &amp;nbsp;Sample was not known to VirusTotal, it was uploaded at the time of analysis&lt;/p&gt;
&lt;p dir="ltr"&gt;32. &amp;nbsp;&lt;a href="https://developers.google.com/android/play-protect"&gt;https://developers.google.com/android/play-protect&lt;/a&gt;&lt;/p&gt;
&lt;/span&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/india2019s-parental-control-directive-and-the-need-to-improve-stalkerware-detection'&gt;http://editors.cis-india.org/internet-governance/blog/india2019s-parental-control-directive-and-the-need-to-improve-stalkerware-detection&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>divyank</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2024-04-04T14:20:41Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/dot2019s-order-to-trace-server-ip-addresses-will-lead-to-unintended-censorship">
    <title>DoT’s order to trace server IP addresses will lead to unintended censorship</title>
    <link>http://editors.cis-india.org/internet-governance/blog/dot2019s-order-to-trace-server-ip-addresses-will-lead-to-unintended-censorship</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;p&gt;&lt;em&gt;This post was reviewed and edited by Isha Suri and Nishant Shankar.&lt;/em&gt;&lt;/p&gt;
&lt;p id="docs-internal-guid-d922467c-7fff-5fa3-72ce-d587201d3efe" dir="ltr"&gt;In December 2023, the Department of Telecommunications (DoT) issued &lt;a href="https://web.archive.org/web/20240117111601/https://dot.gov.in/sites/default/files/Data%20base%20of%20IP%20address%20being%20used%20in%20india%20Letter%20dated.pdf?download=1%2A"&gt;instructions&lt;/a&gt; to internet service providers (ISPs) to maintain and share a list of “customer owned” IP addresses that host internet services through Indian ISPs so that they can be immediately traced in case “they are required to be blocked as per orders of [the court], etc”.&lt;/p&gt;
&lt;p&gt;For the purposes of the notification, tracing customer-owned IP addresses implies identifying the network location of a subset of web services that possess their own IP addresses, as opposed to renting them from the ISP. These web services purchase &lt;a href="https://www.thousandeyes.com/learning/techtorials/transit-provider"&gt;IP Transit&lt;/a&gt; from Indian ISPs in order to connect their servers to the internet. In such cases, it is not immediately apparent which ISP routes to a particular IP address, requiring some amount of manual tracing to locate the host and immediately cut off access to the service. The order notes that “It has been observed that many times it is time consuming to trace location of such servers specially in case the IP address of servers is customer owned and not allocated by the Licensed Internet Service Provider”.&lt;/p&gt;
&lt;p&gt;This indicates that, not only is the DoT blocking access to web services based on their IP addresses, but is doing so often enough for manual tracing of IP addresses to be a time consuming process for them.&lt;/p&gt;
&lt;p&gt;While our &lt;a href="https://theleaflet.in/content-takedown-and-users-rights/"&gt;legal framework&lt;/a&gt; allows courts and the government to issue content takedown orders, it is well documented that blocking web services based on their IP addresses is ineffectual and disruptive. An &lt;a href="https://www.internetsociety.org/resources/doc/2017/internet-content-blocking/"&gt;explainer&lt;/a&gt; on content blocking by the Internet Society notes, “Generally, IP blocking is a poor filtering technique that is not very effective, is difficult to maintain effectively, has a high level of unintended additional blockage, and is easily evaded by publishers who move content to new servers (with new IP addresses)”. The practice of virtual hosting is very common on the internet, which entails that a single web service can span multiple IP addresses and a single IP address can be shared by hundreds, or even thousands, of web services. Blocking access to a particular IP address can cause unrelated web services to fail in subtle and unpredictable ways, leading to collateral censorship. For &lt;a href="https://www.internetsociety.org/resources/doc/2017/internet-content-blocking/"&gt;example&lt;/a&gt;, a 2022 Austrian court order to block 11 IP addresses associated with 14 websites that engaged in copyright infringement rendered thousands of unrelated websites inaccessible.&lt;/p&gt;
&lt;p&gt;The unintended effects of IP blocking have also been observed in practice in India. In 2021, US-based OneSignal Inc. approached the Delhi High Court &lt;a href="https://theprint.in/judiciary/us-firm-one-signal-moves-delhi-hc-says-ip-address-blocked-in-india-without-intimation/587852/"&gt;challenging&lt;/a&gt; the blockage of one of its IP addresses by ISPs in India. With OneSignal being an online marketing company, there did not appear to be any legitimate reason for it to be blocked. In &lt;a href="https://telecom.economictimes.indiatimes.com/news/ip-address-of-us-based-onesignal-unblocked-in-october-last-year-centre-to-hc/80872441"&gt;response&lt;/a&gt; to the petition the Government said that they had already issued unblocking orders for the IP address. There have also been &lt;a href="https://github.com/captn3m0/hello-cloudflare#impact"&gt;numerous&lt;/a&gt; &lt;a href="https://www.reddit.com/r/india/comments/ytjcat/bgpix_level_blocks_on_ip_addresses_owned_by/"&gt;reports&lt;/a&gt; by internet users of inexplicable blocking of innocuous websites hosted on content delivery networks (which are known to often share IP addresses between customers).&lt;/p&gt;
&lt;p&gt;We urge the ISPs, government departments and courts issuing and implementing website blocking orders to refrain from utilising overly broad censorship mechanisms like IP blocking which can lead to failure of unrelated services on the internet.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/dot2019s-order-to-trace-server-ip-addresses-will-lead-to-unintended-censorship'&gt;http://editors.cis-india.org/internet-governance/blog/dot2019s-order-to-trace-server-ip-addresses-will-lead-to-unintended-censorship&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>divyank</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2024-01-25T11:19:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/detecting-encrypted-client-hello-ech-blocking">
    <title>Detecting Encrypted Client Hello (ECH) Blocking</title>
    <link>http://editors.cis-india.org/internet-governance/blog/detecting-encrypted-client-hello-ech-blocking</link>
    <description>
        &lt;b&gt;A new internet protocol makes it harder for internet service providers to censor websites. We made a technical intervention to check if censors are interfering with its deployment.&lt;/b&gt;
        
&lt;p&gt;&lt;em&gt;This blogpost was edited by Torsha Sarkar.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong id="docs-internal-guid-3a0f4668-7fff-7b3b-0095-ae2013caed2b"&gt;
&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;span id="docs-internal-guid-3a0f4668-7fff-7b3b-0095-ae2013caed2b"&gt;The Transport Layer Security (TLS) protocol, which is widely recognised as the lock sign in a web browser’s URL bar, encrypts the contents of internet connections when an internet user visits a website so that network intermediaries (such as Internet Service Providers, Internet Exchanges, undersea cable operators, etc.) cannot view the private information being exchanged with the website. &lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;span id="docs-internal-guid-3a0f4668-7fff-7b3b-0095-ae2013caed2b"&gt;
&lt;p dir="ltr"&gt;TLS, however, suffers from a privacy issue – the protocol transmits a piece of information known as the Server Name Indication (or SNI) which contains the name of the website a user is visiting. While the purpose of TLS is to encrypt private information, the SNI remains unencrypted – leaking the names of the websites internet users visit to network intermediaries, who use this metadata to &lt;a href="https://www.ft.com/content/adf1cbae-4217-4d7d-9271-8bec41a56fb4"&gt;surveil&lt;/a&gt; internet users and &lt;a href="https://arxiv.org/abs/1912.08590"&gt;censor&lt;/a&gt; access to certain websites. In India, two large internet service providers – Reliance Jio and Bharti Airtel – have been previously &lt;a href="https://www.petsymposium.org/foci/2023/foci-2023-0006.pdf"&gt;found&lt;/a&gt; using the SNI field to block access to websites.&lt;/p&gt;
&lt;p dir="ltr"&gt;Encrypted Client Hello (or &lt;a href="https://datatracker.ietf.org/doc/draft-ietf-tls-esni/"&gt;ECH)&lt;/a&gt; is a new internet protocol that has been under development since 2018 at the Internet Engineering Task Force (&lt;a href="https://www.ietf.org/"&gt;IETF&lt;/a&gt;) and is now being &lt;a href="https://datatracker.ietf.org/doc/minutes-117-tls-202307262000/"&gt;tested&lt;/a&gt; for a small percentage of internet users before a wider rollout. It seeks to address this privacy limitation by encrypting the SNI information that leaks the names of visited websites to internet intermediaries. The ECH protocol significantly raises the bar for censors – the SNI is the last bit of unencrypted metadata in internet connections that censors can reliably use to detect which websites an internet user is visiting. After this protocol is deployed, censors will find it harder to block websites by interfering with network connections and will be forced to utilise blocking methods such as &lt;a href="https://www.ietf.org/archive/id/draft-irtf-pearg-website-fingerprinting-01.html"&gt;website fingerprinting&lt;/a&gt; and &lt;a href="https://en.wikipedia.org/wiki/Kazakhstan_man-in-the-middle_attack"&gt;man-in-the-middle attacks&lt;/a&gt; that are either expensive and less accurate, or unfeasible in most cases.&lt;/p&gt;
&lt;p dir="ltr"&gt;We have been tracking the development of this privacy enhancement. To assist the successful deployment of the ECH protocol, we contributed a new censorship test to the Open Observatory for Network Interference (&lt;a href="https://ooni.org/"&gt;OONI&lt;/a&gt;) late last year. The &lt;a href="https://github.com/ooni/probe-cli/pull/970"&gt;new test&lt;/a&gt; attempts to connect to websites using the ECH protocol and records any interference from censors to the connection. As censors in some countries were &lt;a href="https://www.bleepingcomputer.com/news/security/south-korea-is-censoring-the-internet-by-snooping-on-sni-traffic/"&gt;found&lt;/a&gt; &lt;a href="https://www.zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni/"&gt;blocking&lt;/a&gt; a previous version of the protocol entirely, this test gives important early feedback to the protocol developers on whether censors are able to detect and block the protocol.&lt;/p&gt;
&lt;p dir="ltr"&gt;We conducted ECH tests during the first week of September 2023 from four popular Indian ISPs, namely Airtel, Atria Convergence Technologies (ACT), Reliance Jio, and Vodafone Idea, which &lt;a href="https://trai.gov.in/sites/default/files/PR_No.31of2023_0.pdf"&gt;account&lt;/a&gt; for around 95% of the Indian internet subscriber base. The &lt;a href="https://gist.github.com/d1vyank/e8d0053b3819cda555d119780a75d65f"&gt;results&lt;/a&gt; indicated that ECH connections to a popular website were successful and are not currently being blocked. This was the expected result, as the protocol is still under development. We will continue to monitor for interference from censors closer to the time of completion of the protocol to ensure that this privacy enhancing protocol is successfully deployed.&lt;/p&gt;
&lt;/span&gt;&lt;strong id="docs-internal-guid-3a0f4668-7fff-7b3b-0095-ae2013caed2b"&gt;
&lt;/strong&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/detecting-encrypted-client-hello-ech-blocking'&gt;http://editors.cis-india.org/internet-governance/blog/detecting-encrypted-client-hello-ech-blocking&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>divyank</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2023-09-05T12:10:47Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/openness/security-of-open-source-software-a-survey-of-technical-stakeholders2019-perceptions-and-actions">
    <title>Security of Open Source Software : A Survey of Technical Stakeholders’ Perceptions and Actions</title>
    <link>http://editors.cis-india.org/openness/security-of-open-source-software-a-survey-of-technical-stakeholders2019-perceptions-and-actions</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/openness/security-of-open-source-software-a-survey-of-technical-stakeholders2019-perceptions-and-actions'&gt;http://editors.cis-india.org/openness/security-of-open-source-software-a-survey-of-technical-stakeholders2019-perceptions-and-actions&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>divyank</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2023-04-13T06:02:20Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/openness/securing-our-dependence-on-code-reuse-in-software">
    <title>Securing Our Dependence on Code Reuse in Software </title>
    <link>http://editors.cis-india.org/openness/securing-our-dependence-on-code-reuse-in-software</link>
    <description>
        &lt;b&gt;Dividing and breaking up a software project into smaller modules with functionality that can be reused to build other software is an increasingly common practice in software development today. We examine our infrastructural dependence on reuse of open-source software (OSS) components, examine the unique security risks posed by the widespread reuse of code, and survey systemic solutions to securing code reuse. &lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;Dividing and breaking up a software project into smaller modules with functionality that can be reused to build other software is an increasingly common practice in software development today. Much of this reuse happens in the form of open-source software (OSS) packages, i.e. software whose source code is openly available on the internet with a permissive licence which allows for its reuse and modification. A study that analysed the composition of over 2400 commercial software applications from seventeen industries found that, on average, 78% of the code used to build them was open-source software – indicating that code reuse is not merely supplemental, but foundational to software development processes today. Relying on domain experts to build and maintain the functionality that is ancillary to a software application’s primary purpose saves effort and allows application developers to focus on their own work domains. For instance, a developer building a video conferencing application – such as Zoom – may reuse an open-source library called ffmpeg to encode and decode video streams, or another open-source component, OpenSSL, to encrypt and decrypt the encoded streams as they are transmitted over the internet, rather than reimplementing this functionality from scratch.&lt;br /&gt;&lt;br /&gt;Despite the well-known practical benefits of code reuse and its prevalence in all of the digital products and services our society relies on, several security incidents in widely used OSS projects have shown that such projects are often underfunded and under-maintained. The ‘Heartbleed’ vulnerability most clearly illustrates this. In 2014, a security vulnerability in the OpenSSL software library – which is widely used to encrypt web traffic – affected about one-fifth of the servers on the internet. Malicious actors could have exploited this vulnerability to decrypt all of the data that these servers handled and even impersonated them.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In this report, we examine our infrastructural dependence on reuse of OSS components and develop an understanding of the security risks posed by the widespread reuse of code that is developed and maintained by untrusted individuals and organisations that have no obligation to provide these services or any subsequent support.&lt;br /&gt; &lt;br /&gt;We present an analysis of common security issues in OSS packages, with a focus on the unique security issues that arise in the tooling and processes used to store, distribute and operate reused code. Finally, we survey solutions and frameworks which seek to address some of these issues on a systemic level.&lt;br /&gt; &lt;br /&gt;This report is primarily aimed at regulators, technical decision-makers and organisations invested in furthering research in this area. It can also serve as a starting point for software developers who want to learn about the common security pitfalls of using OSS components and how they can avoid them.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Click to download the &lt;strong&gt;&lt;a class="external-link" href="https://cis-india.org/openness/Securing%20Our%20Dependence%20on%20Code%20Reuse.pdf/at_download/file"&gt;full report&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/openness/securing-our-dependence-on-code-reuse-in-software'&gt;http://editors.cis-india.org/openness/securing-our-dependence-on-code-reuse-in-software&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>divyank</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2023-04-13T05:47:00Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/openness/Securing%20Our%20Dependence%20on%20Code%20Reuse.pdf">
    <title>Securing Our Dependence on Code Reuse.pdf</title>
    <link>http://editors.cis-india.org/openness/Securing%20Our%20Dependence%20on%20Code%20Reuse.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/openness/Securing%20Our%20Dependence%20on%20Code%20Reuse.pdf'&gt;http://editors.cis-india.org/openness/Securing%20Our%20Dependence%20on%20Code%20Reuse.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>divyank</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2023-04-12T11:40:31Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/censorwatch-on-the-implementation-of-online-censorship-in-india">
    <title>CensorWatch: On the Implementation of Online Censorship in India</title>
    <link>http://editors.cis-india.org/internet-governance/blog/censorwatch-on-the-implementation-of-online-censorship-in-india</link>
    <description>
        &lt;b&gt;Results from a nation-wide empirical study on web censorship&lt;/b&gt;
        
&lt;p&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Abstract:&lt;/strong&gt; State authorities in India order domestic internet 
service providers (ISPs) to block access to websites and services. We 
developed a mobile application, CensorWatch, that runs network tests to 
study inconsistencies in how ISPs conduct censorship. We analyse the 
censorship of 10,372 sites, with measurements collected across 71 
networks from 25 states in the country. We find that ISPs in India rely 
on different methods of censorship with larger ISPs utilizing methods 
that are harder to circumvent. By comparing blocklists and contextualising them with specific legal orders, we find concrete evidence 
that ISPs in India are blocking different websites and engaging in 
arbitrary blocking, in violation of Indian law.&lt;/p&gt;
&lt;p&gt;The paper authored by Divyank Katira, Gurshabad Grover, Kushagra Singh and Varun Bansal appeared as part of the conference on Free and Open Communications on the Internet (FOCI '23) and can be accessed &lt;a href="https://www.petsymposium.org/foci/2023/foci-2023-0006.pdf"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;span dir="ltr"&gt;The authors would like to thank Pooja Saxena and Akash&lt;/span&gt;&lt;span dir="ltr"&gt; Sheshadri for contributing to the visual design of Censor&lt;/span&gt;&lt;span dir="ltr"&gt;watch; Aayush Rathi, Amber Sinha and Vipul Kharbanda&lt;/span&gt;&lt;span dir="ltr"&gt; for their valuable legal inputs; Internet Freedom Foundation&lt;/span&gt;&lt;span dir="ltr"&gt; for their support; ipinfo.io for providing free access to their&lt;/span&gt;&lt;span dir="ltr"&gt; data and services. The work was made possible because of&lt;/span&gt;&lt;span dir="ltr"&gt; research grants to the Centre for Internet and Society from the&lt;/span&gt;&lt;span dir="ltr"&gt; MacArthur Foundation, Article 19, the East-West Man&lt;/span&gt;&lt;span dir="ltr"&gt;agement Institute and the New Venture Fund. Gurshabad Grover’s contributions were&lt;/span&gt;&lt;span dir="ltr"&gt; supported by a research fellowship from the Open Tech Fund.&lt;/span&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/censorwatch-on-the-implementation-of-online-censorship-in-india'&gt;http://editors.cis-india.org/internet-governance/blog/censorwatch-on-the-implementation-of-online-censorship-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>divyank</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2023-03-15T11:58:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/comments-on-indea-2.0">
    <title>Comments on InDEA 2.0</title>
    <link>http://editors.cis-india.org/internet-governance/comments-on-indea-2.0</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/comments-on-indea-2.0'&gt;http://editors.cis-india.org/internet-governance/comments-on-indea-2.0&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>divyank</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2022-03-22T06:26:39Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/do-we-really-need-an-app-for-that-examining-the-utility-and-privacy-implications-of-india2019s-digital-vaccine-certificates">
    <title>Do We Really Need an App for That? Examining the Utility and Privacy Implications of India’s Digital Vaccine Certificates</title>
    <link>http://editors.cis-india.org/internet-governance/blog/do-we-really-need-an-app-for-that-examining-the-utility-and-privacy-implications-of-india2019s-digital-vaccine-certificates</link>
    <description>
        &lt;b&gt;We examine the purported benefits of digital vaccine certificates over regular paper-based ones and analyse the privacy implications of their use.&lt;/b&gt;
        
&lt;p&gt;&lt;em&gt;This blogpost was edited by Gurshabad Grover, Yesha Tshering Paul, and Amber Sinha.&lt;br /&gt;It was originally published on &lt;a href="https://digitalid.design/vaccine-certificates.html"&gt;Digital Identities: Design and Uses&lt;/a&gt; and is cross-posted here.&lt;br /&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;In an experiment to streamline its COVID-19 immunisation drive, India has adopted a centralised vaccine administration system called CoWIN (or COVID Vaccine Intelligence Network). In addition to facilitating registration for both online and walk-in vaccine appointments, the system also allows for the &lt;a href="https://verify.cowin.gov.in/" target="_blank"&gt;digital verification&lt;/a&gt; of vaccine certificates, which it issues to people who have received a dose. This development aligns with a global trend, as many countries have adopted or are in the process of adopting “vaccine passports” to facilitate safe movement of people while resuming commercial activity.
    &lt;br /&gt;&lt;br /&gt;Some places, such as the &lt;a href="https://www.schengenvisainfo.com/news/all-your-questions-on-eus-covid-19-vaccine-certificate-answered/" target="_blank"&gt;EU&lt;/a&gt;, have constrained the scope of use of their vaccine certificates to international travel. The Indian government, however, has so far &lt;a href="https://www.livemint.com/opinion/columns/vaccination-certificates-need-a-framework-to-govern-their-use-11618160385602.html" target="_blank"&gt;skirted&lt;/a&gt; important questions around where and when this technology should be used. By allowing &lt;a href="https://verify.cowin.gov.in/" target="_blank"&gt;anyone&lt;/a&gt; to use the online CoWIN portal to scan and verify certificates, and even providing a way for the private-sector to incorporate this functionality into their applications, the government has opened up the possibility of these digital certificates being used, and even mandated, for domestic everyday use such as going to a grocery shop, a crowded venue, or a workplace.
    &lt;br /&gt;&lt;br /&gt;In this blog post, we examine the purported benefits of digital vaccine certificates over regular paper-based ones, analyse the privacy implications of their use, and present recommendations to make them more privacy respecting. We hope that such an analysis can help inform policy on appropriate use of this technology and improve its privacy properties in cases where its use is warranted.
    &lt;br /&gt;&lt;br /&gt;We also note that while this post only examines the merits of a technological solution put out by the government, it is more important to &lt;a href="https://www.accessnow.org/cms/assets/uploads/2021/04/Covid-Vaccine-Passports-Threaten-Human-Rights.pdf" target="_blank"&gt;consider&lt;/a&gt; the effects that placing restrictions on the movement of unvaccinated people has on their civil liberties in the face of a vaccine rollout that is inequitable along many lines, including &lt;a href="https://thewire.in/gender/women-falling-behind-in-indias-covid-19-vaccination-drive" target="_blank"&gt;gender&lt;/a&gt;, &lt;a href="https://www.thehindu.com/sci-tech/science/will-25-covid-19-vaccines-for-private-hospitals-aggravate-inequity/article34799098.ece" target="_blank"&gt;caste-class&lt;/a&gt;, and &lt;a href="https://scroll.in/article/994871/tech-savvy-indians-drive-to-villages-for-covid-19-vaccinations-those-without-smartphones-lose-out" target="_blank"&gt;access to technology&lt;/a&gt;.&lt;/p&gt;
&lt;h4&gt;How do digital vaccine certificates work?&lt;/h4&gt;
&lt;p&gt;Every vaccine recipient in the country is required to be registered on the CoWIN platform using one of &lt;a href="https://www.cowin.gov.in/faq" target="_blank"&gt;seven&lt;/a&gt; existing identity documents. [1] &lt;a name="ref1"&gt;&lt;/a&gt; Once a vaccine is administered, CoWIN generates a vaccine certificate which the recipient can access on the CoWIN website. The certificate is a single page document that contains the recipient’s personal information — their name, age, gender, identity document details, unique health ID, a reference ID — and some details about the vaccine given.&lt;a name="ref2"&gt;&lt;/a&gt; [2] It also includes a “secure QR code” and a link to CoWIN’s verification &lt;a href="https://verify.cowin.gov.in/" target="_blank"&gt;portal&lt;/a&gt;.
  &lt;br /&gt;&lt;br /&gt;The verification portal allows for the verification of a certificate by scanning the attached QR code. Upon completion, the portal displays a success message along with some of the information printed on the certificate.
  &lt;br /&gt;&lt;br /&gt;Verification is done using a cryptographic mechanism known as &lt;a href="https://en.wikipedia.org/wiki/Digital_signature" target="_blank"&gt;digital signatures&lt;/a&gt;, which are encoded into the QR code attached to a vaccine certificate. This mechanism allows “offline verification”, which means that the CoWIN verification portal or any private sector app attempting to verify a certificate does not need to contact the CoWIN servers to establish its authenticity. It instead uses a “public key” issued by CoWIN beforehand to verify the digital signature attached to the certificate.
  &lt;br /&gt;&lt;br /&gt;The benefit of this convoluted design is that it protects user privacy. Performing verification offline and not contacting the CoWIN servers, precludes CoWIN from gleaning sensitive metadata about usage of the vaccine certificate. This means that CoWIN does not learn about where and when an individual uses their vaccine certificate, and who is verifying it. This closes off a potential avenue for mass surveillance. [3] However, given how certificate revocation checks are being implemented (detailed in the privacy implications section below), CoWIN ends up learning this information anyway.&lt;/p&gt;
&lt;h4&gt;Where is digital verification useful?&lt;/h4&gt;
&lt;p&gt;The primary argument for the adoption of digital verification of vaccine certificates over visual examination of regular paper-based ones is security. In the face of vaccine hesitancy, there are concerns that people may forge vaccine certificates to get around any restrictions that may be put in place on the movement of unvaccinated people. The use of digital signatures serves to allay these fears.
&lt;br /&gt;&lt;br /&gt;In its current form, however, digital verification of vaccine certificates is no more secure than visually inspecting paper-based ones. While the “secure QR code” attached to digital certificates can be used to verify the authenticity of the certificate itself, the CoWIN verification portal does not provide any mechanism nor does it instruct verifiers to authenticate the identity of the person presenting the certificate. This means that unless an accompanying identity document is also checked, an individual can simply present someone else’s certificate.
&lt;br /&gt;&lt;br /&gt;There are no simple solutions to this limitation; adding a requirement to inspect identity documents in addition to digital verification of the vaccine certificate would not be a strong enough security measure to prevent the use of duplicate vaccine certificates. People who are motivated enough to forge a vaccine certificate, can also duplicate one of the seven ID documents which can be used to register on CoWIN, some of which are simple paper-based documents. [4] Requiring even stronger identity checks, such as the use of Aadhaar-based biometrics, would make digital verification of vaccine certificates more secure. However, this would be a wildly disproportionate incursion on user privacy — allowing for the mass collection of metadata like when and where a certificate is used — something that digital vaccine certificates were explicitly designed to prevent. Additionally, in Russia, people were &lt;a href="https://www.washingtonpost.com/world/europe/moscow-fake-vaccine-coronavirus/2021/06/26/0881e1e4-cf98-11eb-a224-bd59bd22197c_story.html" target="_blank"&gt;found&lt;/a&gt; issuing fake certificates by discarding real vaccine doses instead of administering them. No technological solution can prevent such fraud.
&lt;br /&gt;&lt;br /&gt;As such, the utility of digital certificates is limited to uses such as international travel, where border control agencies already have strong identity checks in place for travellers. Any everyday usage of the digital verification functionality on vaccine certificates would not present any benefit over visually examining a piece of paper or a screen.&lt;/p&gt;
&lt;h4&gt;Privacy implications of digital certificates&lt;/h4&gt;
&lt;p&gt;In addition to providing little security utility over manual inspection of certificates, digital certificates also present privacy issues, these are listed below along with recommendations to mitigate them:
&lt;br /&gt;&lt;br /&gt;&lt;em&gt;(i) The verification portal leaks sensitive metadata to CoWIN’s servers:&lt;/em&gt; An analysis of network requests made by the CoWin verification portal reveals that it conducts a ‘revocation check’ each time a certificate is verified. This check was also found in the source &lt;a href="https://github.com/egovernments/DIVOC/blob/e667697b47a50a552b8d0a8c89a950180217b945/interfaces/vaccination-api.yaml#L385" target="_blank"&gt;code&lt;/a&gt;, which is made openly available&lt;a name="ref5"&gt;&lt;/a&gt;.
[5]&lt;/p&gt;
&lt;p&gt;Revocation checks are an important security consideration while using digital signatures. They allow the issuing authority (CoWIN, in this case) to revoke a certificate in case the account associated with it is lost or stolen, or if a certificate requires correction. However, the way they have been implemented here presents a significant privacy issue. Sending certificate details to the server on every verification attempt allows it to learn about where and when an individual is using their vaccine certificate.
&lt;br /&gt;&lt;br /&gt;We note that the revocation check performed by the CoWIN portal does not necessarily mean that it is storing this information. Nevertheless, sending certificate information to the server directly contradicts claims of an “offline verification” process, which is the basis of the design of these digital certificates.
&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Recommendations:&lt;/strong&gt; Implementing privacy-respecting revocation checks such as Certificate Revocation Lists, [6] or Range Queries [7] would mitigate this issue. However, these solutions are either complex or present bandwidth and storage tradeoffs for the verifier.
&lt;br /&gt;&lt;br /&gt;&lt;em&gt;(ii) Oversharing of personally identifiable information:&lt;/em&gt; CoWIN’s vaccine certificates include more personally identifiable information (name, age, gender, identity document details and unique health ID) than is required for the purpose of verifying the certificate. An examination of the vaccine certificates available to us revealed that while the Aadhaar number is appropriately masked, other personal identifiers such as passport number and unique health ID were not masked. Additionally, the inclusion of demographic details, such as age and gender, provides little security benefit by limiting the pool of duplicate certificates that can be used and are not required in light of the security analysis above.
&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Recommendation:&lt;/strong&gt; Personal identifiers (such as passport number and unique health ID) should be appropriately masked and demographic details (age, gender) can be removed.
&lt;br /&gt;&lt;br /&gt;The minimal set of data required for identity-linked usage for digital verification, as described above, is a full name and masked ID document details. All other personally identifying information can be removed. In case of paper-based certificates, which is suggested for domestic usage, only the details about vaccine validity would suffice and no personal information is required.
&lt;br /&gt;&lt;br /&gt;&lt;em&gt;(iii) Making information available digitally increases the likelihood of collection:&lt;/em&gt; All of the personal information printed on the certificate is also encoded into the QR code. This is &lt;a href="https://www.bbc.com/news/uk-scotland-57208607" target="_blank"&gt;necessary&lt;/a&gt; because the digital signature verification process also verifies the integrity of this information (i.e. it wasn’t modified). A side effect of this is that the personal information is made readily available in digital form to verifiers when it is scanned, making it easy for them to store. This is especially likely in private sector apps who may be interested in collecting demographic information and personal identifiers to track customer behaviour.
&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Recommendation:&lt;/strong&gt; Removing extraneous information from the certificate, as suggested above, mitigates this risk as well.&lt;/p&gt;
&lt;h4&gt;Conclusion&lt;/h4&gt;
&lt;p&gt;Our analysis reveals that without incorporating strong, privacy-invasive identity checks, digital verification of vaccine certificates does not provide any security benefit over manually inspecting a piece of paper. The utility of digital verification is limited to purposes that already conduct strong identity checks.
&lt;br /&gt;&lt;br /&gt;In addition to their limited applicability, in their current form, these digital certificates also generate a trail of data and metadata, giving both government and industry an opportunity to infringe upon the privacy of the individuals using them.
&lt;br /&gt;&lt;br /&gt;Keeping this in mind, the adoption of this technology should be discouraged for everyday use.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;References&lt;/h4&gt;
&lt;p&gt;[1] Exceptions &lt;a href="https://web.archive.org/web/20210511045921/https://www.mohfw.gov.in/pdf/SOPforCOVID19VaccinationofPersonswithoutPrescribedIdentityCards.pdf" target="_blank"&gt;exist&lt;/a&gt; for people without state-issued identity documents.&lt;/p&gt;
&lt;p&gt;[2] This information was gathered by inspecting three vaccine certificates linked to the author’s CoWIN account, which they were authorised to view, and may not be fully accurate.&lt;/p&gt;
&lt;p&gt;[3] This design is similar to Aadhaar’s “&lt;a href="https://resident.uidai.gov.in/offline-kyc" target="_blank"&gt;offline KYC&lt;/a&gt;” process.&lt;/p&gt;
&lt;p&gt;[4] “Aadhaar Card: UIDAI says downloaded versions on ordinary paper, mAadhaar perfectly valid”, &lt;em&gt;Zee Business&lt;/em&gt;, April 29 2019, &lt;em&gt;https://www.zeebiz.com/india/news-aadhaar-card-uidai-says-downloaded-versions-on-ordinary-paper-maadhaar-perfectly-valid-96790&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;[5] This check was also verified to be present in the reference &lt;a href="https://github.com/egovernments/DIVOC/blob/261a61093b89990fe34698f9ba17367d4cb74c34/public_app/src/components/CertificateStatus/index.js#L125" target="_blank"&gt;code&lt;/a&gt; made available for private-sector applications incorporating this functionality, suggesting that private sector apps will also be affected by this.&lt;/p&gt;
&lt;p&gt;[6] &lt;a href="https://en.wikipedia.org/wiki/Certificate_revocation_list" target="_blank"&gt;Certificate Revocation Lists&lt;/a&gt; allow the server to provide a list of revoked certificates to the verifier, instead of the verifier querying the server each time. This, however, can place heavy bandwidth and storage requirements on the verifying app as this list can potentially grow long.&lt;/p&gt;
&lt;p&gt;[7] Range Queries are described in this &lt;a href="https://www.ics.uci.edu/~gts/paps/st06.pdf" target="_blank"&gt;paper&lt;/a&gt;. In this method, the verifier requests revocation status from the server by specifying a range of certificate identifiers within which the certificate being verified lies. If there are any revoked certificates within this range, the server will send their identifiers to the verifier, who can then check if the certificate in question is on the list. For this to work, the range selected must be sufficiently large to include enough potential candidates to keep the server from guessing which one is in use.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/do-we-really-need-an-app-for-that-examining-the-utility-and-privacy-implications-of-india2019s-digital-vaccine-certificates'&gt;http://editors.cis-india.org/internet-governance/blog/do-we-really-need-an-app-for-that-examining-the-utility-and-privacy-implications-of-india2019s-digital-vaccine-certificates&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>divyank</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Digital ID</dc:subject>
    
    
        <dc:subject>Covid19</dc:subject>
    
    
        <dc:subject>Appropriate Use of Digital ID</dc:subject>
    

   <dc:date>2021-08-03T05:13:28Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/cis-mozilla-doh-trr">
    <title>cis-mozilla-doh-trr</title>
    <link>http://editors.cis-india.org/internet-governance/cis-mozilla-doh-trr</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/cis-mozilla-doh-trr'&gt;http://editors.cis-india.org/internet-governance/cis-mozilla-doh-trr&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>divyank</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2021-01-19T07:26:04Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/investigating-encrypted-dns-blocking-in-india">
    <title>Investigating Encrypted DNS Blocking in India</title>
    <link>http://editors.cis-india.org/internet-governance/blog/investigating-encrypted-dns-blocking-in-india</link>
    <description>
        &lt;b&gt;We find that encrypted DNS protocols are not blocked in India and share our test methodology.&lt;/b&gt;
        
&lt;p&gt;&lt;em&gt;This report was edited and reviewed by Gurshabad Grover and Simone Basso.&lt;/em&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;The Domain Name System (DNS) translates human-readable web addresses, like ‘cis-india.org’, into machine-readable IP addresses, such as ‘172.67.211.18’, that the routers that comprise the internet can understand and direct traffic to. This basic function of the web has historically operated unencrypted — allowing intermediaries that facilitate access to the internet, like coffee shop Wi-Fi operators and internet service providers (ISPs), to view what websites we visit. This gap in privacy is being exploited by both public and private entities to &lt;a href="https://arxiv.org/abs/1912.08590"&gt;censor&lt;/a&gt; access to the web and &lt;a href="https://bits.blogs.nytimes.com/2015/02/18/atts-offer-share-your-data-for-personalized-ads-or-pay-more/?_r=0"&gt;surveil&lt;/a&gt; our browsing habits.&lt;/p&gt;
&lt;p&gt;New &lt;a href="https://dnsprivacy.org/wiki/display/DP/DNS+Privacy+-+The+Solutions"&gt;internet protocols&lt;/a&gt; are being deployed that attempt to encrypt connections to DNS providers. Through the use of these methods, the contents of DNS queries are hidden from network intermediaries and eavesdroppers and are only visible to the DNS provider chosen by an individual or a default one assigned to them by their ISP or web browser. While there are &lt;a href="https://cis-india.org/internet-governance/blog/reliance-jio-is-using-sni-inspection-to-block-websites"&gt;other ways&lt;/a&gt; of censoring web traffic, encrypted DNS protocols prevent censors from using their older DNS-based methods. In response to these new protocols, states like Iran are trying to &lt;a href="https://ooni.org/post/2020-iran-dot/"&gt;block&lt;/a&gt; them entirely, to maintain the status quo.&lt;/p&gt;
&lt;p&gt;In this report, we investigate and find that encrypted DNS protocols, specifically the &lt;a href="https://tools.ietf.org/html/rfc8484"&gt;DNS over HTTPS&lt;/a&gt; (DoH) and &lt;a href="https://tools.ietf.org/html/rfc8310"&gt;DNS over TLS&lt;/a&gt; (DoT) standards, are accessible through major Indian ISPs, and describe the technical details of our testing methodology.&lt;/p&gt;
&lt;h4 dir="ltr"&gt;Test Setup&lt;/h4&gt;
&lt;p dir="ltr"&gt;We compiled a &lt;a href="https://gist.github.com/d1vyank/5f03302fdf961f0260175acc807d4942"&gt;list&lt;/a&gt; of publicly accessible DNS resolvers that support the encrypted DoH and DoT protocols and tested access to them from four popular Indian ISPs, namely Airtel, Atria Convergence Technologies (ACT), Reliance Jio, and Vodafone. Together, these cover a large majority (roughly 95%, as &lt;a href="https://web.archive.org/web/20200803100152/https://trai.gov.in/sites/default/files/PIR_30062020.pdf"&gt;reported&lt;/a&gt; by TRAI) of the Indian internet subscriber base.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;To test connectivity, we used the Open Observatory for Network Interference (OONI) &lt;a href="https://github.com/ooni/probe-engine"&gt;probe engine&lt;/a&gt; (version &lt;a href="https://github.com/ooni/probe-engine/releases/tag/v0.18.0"&gt;0.18.0&lt;/a&gt;). Specifically, the ‘miniooni’ command-line interface tool bundled with it. Instructions on how to install this can be found &lt;a href="https://github.com/ooni/probe-engine#building-miniooni"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;h4&gt;Test methodology&lt;/h4&gt;
&lt;p dir="ltr"&gt;To test whether DNS providers are reachable over encrypted communication protocols, the tool performs a DNS query using the specified one (either DoH or DoT). If the connection is successful and we receive a response from the DNS server, we conclude that the protocol is not blocked. Failing to query a specific DNS server over DoT or DoH does not necessarily mean that it has been censored. To understand whether a failure could be censorship, rather than a transient error, we would correlate measurements from many users within the same ISP and country and use an alternate network, such as a VPN, to access the possibly blocked service from another country.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In Iran, where DNS over TLS is &lt;a href="https://ooni.org/post/2020-iran-dot/"&gt;reported&lt;/a&gt; to be blocked, it was found that censorship occurs by interfering with the TLS handshake. Traffic corresponding to DNS over TLS is easier to identify and block as it communicates over a unique port and a distinctive ALPN, while DNS over HTTPS traffic is harder to block effectively as the HTTPS standard is widely used on the web and interference would lead to &lt;a href="https://en.wikipedia.org/wiki/Collateral_freedom"&gt;collateral censorship&lt;/a&gt;.&lt;/p&gt;
&lt;h4&gt;Results&lt;/h4&gt;
&lt;p dir="ltr"&gt;The tests were run on each ISP in early October 2020 using the following command:&lt;/p&gt;
&lt;div&gt;&lt;code&gt;$ ./miniooni --file=./resolvers.txt dnscheck&lt;/code&gt;&lt;/div&gt;
&lt;div&gt;&lt;code&gt;&lt;br /&gt;&lt;/code&gt;&lt;/div&gt;
&lt;p dir="ltr"&gt;The raw results in the OONI &lt;a href="https://github.com/ooni/spec/tree/master/data-formats"&gt;data format&lt;/a&gt; can be found &lt;a href="https://gist.github.com/d1vyank/be47bbcb90c1964c9279c9170b1c2ce0"&gt;here&lt;/a&gt;. A summary of the observations are as follows:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;All DNS resolvers tested were accessible over both DoH and DoT protocols from all ISPs tested.&lt;/li&gt;&lt;li&gt;IPv6 addresses were not reachable through ACT broadband. This limitation was independently confirmed using the &lt;a href="https://test-ipv6.com/"&gt;Test-IPv6 tool&lt;/a&gt; and has also been discussed on &lt;a href="https://www.reddit.com/r/bangalore/comments/gs2ibd/act_fibernet_ipv6/"&gt;Reddit&lt;/a&gt;.
&lt;/li&gt;&lt;/ul&gt;
&lt;h4&gt;Limitations&lt;/h4&gt;
&lt;p dir="ltr"&gt;As our &lt;a href="https://cis-india.org/internet-governance/blog/how-india-censors-the-web"&gt;previous research&lt;/a&gt; by the Centre for Internet and Society indicates, censorship practices vary across ISPs. While we find no evidence of encrypted DNS protocols being blocked on these four major ISPs, there may be others implementing such blocking.&lt;/p&gt;
&lt;p&gt;The second limitation is that these tests were run on a handful of connections from a couple of locations (Delhi and Bangalore). Web censorship mechanisms may vary by location within the country.&lt;/p&gt;
&lt;p&gt;Finally, the results only indicate the accessibility of encrypted DNS resolvers at a particular point in time. We have not put in place any continuous monitoring of the censorship of encrypted DNS protocols.&lt;/p&gt;
&lt;h4 dir="ltr"&gt;Conclusion&lt;/h4&gt;
&lt;p dir="ltr"&gt;Broadly, the legal framework of web censorship in India allows the Government and courts to ask ISPs to block access to online resources. The precise technical details of how to implement the censorship are left to the ISPs.&lt;/p&gt;
&lt;p&gt;Because of net neutrality obligations, ISPs are not supposed to arbitrarily block resources. Coupled with the fact that the use of encrypted DNS protocols is not related to any particular content/website deemed unlawful, it might be expected that ISPs are not blocking encrypted DNS protocols. However, previous evidence of arbitrary blocking by ISPs motivated us to study whether any major ISP was blocking the use of these protocols or preventing access to any third-party DNS server.&lt;/p&gt;
&lt;p&gt;As part of this exercise, we also contributed code to the OONI probe engine, making it easier for other researchers to test connectivity to multiple DNS providers.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/investigating-encrypted-dns-blocking-in-india'&gt;http://editors.cis-india.org/internet-governance/blog/investigating-encrypted-dns-blocking-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>divyank</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2020-10-27T11:21:08Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/the-state-of-secure-messaging">
    <title>The State of Secure Messaging</title>
    <link>http://editors.cis-india.org/internet-governance/blog/the-state-of-secure-messaging</link>
    <description>
        &lt;b&gt;A look at the protections provided by and threats posed to secure communication online.&lt;/b&gt;
        
&lt;p&gt;&lt;em&gt;This blogpost was edited by Gurshabad Grover and Amber Sinha.&lt;/em&gt;&lt;/p&gt;
&lt;p dir="ltr"&gt;The current benchmark for secure communication online is 
end-to-end encrypted messaging. It refers to a method of encryption 
wherein the contents of a message are only readable by the devices of 
the individuals, or endpoints, participating in the communication. All 
other Internet intermediaries such as internet service providers, 
internet exchange points, undersea cable operators, data centre 
operators, and even the messaging service providers themselves cannot 
read them. This is achieved through cryptographic &lt;a href="https://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange"&gt;mechanisms&lt;/a&gt;
 that allow independent devices to establish a shared secret key over an
 insecure communication channel, which they then use to encrypt and 
decrypt messages. Common examples of end-to-end encrypted messaging are 
applications like Signal and WhatsApp.&lt;/p&gt;
&lt;p dir="ltr"&gt;This post attempts to give at-risk individuals, concerned 
citizens, and civil society at large a more nuanced understanding of the
 protections provided and threats posed to the security and privacy of 
their communications online.&lt;/p&gt;
&lt;h4 dir="ltr"&gt;Threat Model&lt;/h4&gt;
&lt;p dir="ltr"&gt;The first step to assessing security and privacy is to 
identify and understand actors and risks. End-to-end encrypted messaging
 applications consider the following threat model:&lt;/p&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Device compromise: Can happen physically through loss or 
theft, or remotely. Access to an individual’s device could be gained 
through technical flaws or coercion (&lt;a href="https://www.eff.org/wp/digital-privacy-us-border-2017"&gt;legal&lt;/a&gt;, or &lt;a href="https://xkcd.com/538/"&gt;otherwise&lt;/a&gt;). It can be temporary or be made persistent by installing &lt;a href="https://citizenlab.ca/2019/10/nso-q-cyber-technologies-100-new-abuse-cases/"&gt;malware&lt;/a&gt; on the device.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Network monitoring and interference: Implies access to data
 in transit over a network. All Internet intermediaries have such 
access. They may either actively interfere with the communication or 
passively &lt;a href="https://www.theatlantic.com/international/archive/2013/07/the-creepy-long-standing-practice-of-undersea-cable-tapping/277855/"&gt;observe&lt;/a&gt; traffic.&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Server compromise: Implies access to the web server hosting
 the application. This could be achieved through technical flaws, 
insider access such as an employee, or through coercion (&lt;a href="https://en.wikipedia.org/wiki/Investigatory_Powers_Act_2016"&gt;legal&lt;/a&gt;, or otherwise).&amp;nbsp;&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p dir="ltr"&gt;End-to-end encrypted messaging aims to offer complete 
message confidentiality and integrity in the face of server and network 
compromise, and some protections against device compromise. These are 
detailed below.&lt;/p&gt;
&lt;h4 dir="ltr"&gt;Protections Provided&lt;/h4&gt;
&lt;p dir="ltr"&gt;Secure messaging services guarantee certain properties. For
 mature services that have received adequate study from researchers, we 
can assume them to be sound, barring implementation flaws which are 
described later.&lt;/p&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Confidentiality: The contents of a message are kept private and the ciphers used are &lt;a href="https://pthree.org/2016/06/19/the-physics-of-brute-force/"&gt;practically&lt;/a&gt; unbreakable by adversaries.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Integrity: The contents of a message cannot be modified in transit.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Deniability: Aims to mimic unrecorded real-world 
conversations where an individual can deny having said something. 
Someone in possession of the chat transcript cannot &lt;em&gt;cryptographically&lt;/em&gt;
 prove that an individual authored a particular message. While some 
applications feature such off-the-record messaging capabilities, the 
legal applicability of such mechanisms is &lt;a href="https://debian-administration.org/users/dkg/weblog/104"&gt;debatable&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Forward and Future Secrecy: These properties aim to limit 
the effects of a temporary compromise of credentials on a device. 
Forward secrecy ensures messages collected over the network, which were 
sent before the compromise, cannot be decrypted. Future secrecy ensures 
messages sent post-compromise are protected. These mechanisms are easily
 circumvented in practice as past messages are usually stored on the 
device being compromised, and future messages can be obtained by gaining
 persistent access during compromise. These properties are meant to 
protect individuals &lt;a href="https://hal.inria.fr/hal-01966560/document"&gt;aware&lt;/a&gt; of these limitations in exceptional situations such as a journalist crossing a border.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;h4 dir="ltr"&gt;Shortcomings&lt;/h4&gt;
&lt;p dir="ltr"&gt;While secure messaging services offer useful protections 
they also have some shortcomings. It is useful to understand these and 
their mitigations to minimise risk.&lt;/p&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Metadata: Information about a communication such as &lt;strong&gt;who&lt;/strong&gt; the participants are, &lt;strong&gt;when&lt;/strong&gt; the messages are sent, &lt;strong&gt;where&lt;/strong&gt; the participants are located, and &lt;strong&gt;what&lt;/strong&gt;
 the size of a message is can offer important contextual information 
about a conversation. While some popular messaging services &lt;a href="https://signal.org/blog/sealed-sender/"&gt;attempt&lt;/a&gt;
 to minimize metadata generation, metadata leakage, in general, is still
 considered an open problem because such information can be gleaned by 
network monitoring as well as from server compromise. Application 
policies around whether such data is stored and for how long it is 
retained can improve privacy. There are also &lt;a href="https://ricochet.im/"&gt;experimental&lt;/a&gt; approaches that use techniques like onion routing to hide metadata.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Authentication: This is the process of asserting whether an
 individual sending or receiving a message is who they are thought to 
be. Current messaging services trust application servers and cell 
service providers for authentication, which means that they have the 
ability to replace and impersonate individuals in conversations. 
Messaging services offer advanced features to mitigate this risk, such 
as notifications when a participant’s identity changes, and manual 
verification of participants’ security keys through other communication 
channels (in-person, mail, etc.).&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Availability: An individual’s access to a messaging service
 can be impeded. Intermediaries may delay or drop messages resulting in 
what is called a denial of service attack. While messaging services are 
quite resilient to such attacks, governments may censor or completely 
shut down Internet access.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Application-level gaps: Capabilities offered by services in
 addition to messaging, such as contact discovery, online status, and 
location sharing are often &lt;a href="https://www.forbes.com/sites/thomasbrewster/2017/01/22/whatsapp-facebook-backdoor-government-data-request/"&gt;not covered&lt;/a&gt;
 by end-to-end encryption and may be stored by the application server. 
Application policies around how such information is gathered and 
retained affect privacy.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;Implementation flaws and backdoors: Software or hardware 
flaws (accidental or intentional) on an individual’s device could be 
exploited to circumvent the protections provided by end-to-end 
encryption. For mature applications and platforms, accidental flaws are 
difficult and &lt;a href="https://arstechnica.com/information-technology/2019/09/for-the-first-time-ever-android-0days-cost-more-than-ios-exploits/"&gt;expensive&lt;/a&gt; to exploit, and as such are only accessible to Government or other 
powerful actors who typically use them to surveil individuals of 
interest (and not for mass surveillance). Intentional flaws or backdoors
 introduced by manufacturers may also be present. The only defence 
against these is security researchers who rely on manual inspection to 
examine software and network interactions to detect them.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;h4 dir="ltr"&gt;Messaging Protocols and Standards&lt;/h4&gt;
&lt;p dir="ltr"&gt;In the face of demands for exceptional access to encrypted 
communication from governments, and risks of mass surveillance from both
 governments and corporations, end-to-end encryption is important to 
enable secure and private communication online. The signal protocol, 
which is open and adopted by popular applications like WhatsApp and 
Signal, is considered a success story as it brought end-to-end 
encryption to over a billion users and has become a de-facto standard.&lt;/p&gt;
&lt;p dir="ltr"&gt;However, it is unilaterally developed and controlled by a single organisation. Messaging Layer Security (or &lt;a href="https://datatracker.ietf.org/wg/mls/about/"&gt;MLS&lt;/a&gt;)
 is a working group within the Internet Engineering Task Force (IETF) 
that is attempting to standardise end-to-end encryption through 
participation of individuals from corporations, academia, and civil 
society. The draft protocol offers the standard security properties 
mentioned above, except for deniability which is still being considered.
 It incorporates novel research that allows it to scale efficiently for 
large groups up to thousands of participants, which is an improvement 
over the signal protocol. MLS aims to increase adoption further by 
creating open standards and implementations, similar to the Transport 
Layer Security (TLS) protocol used to encrypt much of the web today. 
There is also a need to look beyond end-to-end encryption to address its
 shortcomings, particularly around authentication and metadata leakage.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/the-state-of-secure-messaging'&gt;http://editors.cis-india.org/internet-governance/blog/the-state-of-secure-messaging&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>divyank</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Encryption</dc:subject>
    
    
        <dc:subject>IETF</dc:subject>
    

   <dc:date>2020-07-17T08:12:15Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
