Security

Twitter now supports Encrypted Direct Messages, with some limitations

Twitter is rolling out support for encrypted direct messages (DMs), the security feature will be initially available for the verified users.

Twitter is rolling out support for encrypted direct messages (DMs), the feature is initially limited to verified users or affiliates to a verified organization that are using the latest version of the app (iOS, Android, Web).

The latest version of Twitter apps (iOS, Android, Web) generates a couple of private and public keys for the device. The public key is automatically registered when a user logs into Twitter on a new device or browser;  the private key is stored exclusively on the device and Twitter doesn’t know it. The platform also uses a per conversation key that is used to encrypt the content of messages. The per conversation key is shared between participating devices using a classic PKI scheme based on the private-public key pairs of the sender and receiver.

“We employ a combination of strong cryptographic schemes to encrypt every single message, link, and reaction that are part of an encrypted conversation before they leave the sender’s device, and remain encrypted while stored on Twitter’s infrastructure.” reads the announcement published by Twitter. “Once messages are received by the recipient devices, they are decrypted so that they can be read by the user.”

Twitter announced plans to open-source our implementation, at this time Twitter has yet to disclose the method it is using to secure the messages. The company will release a technical analysis of the encryption process later this year.

To send and receive encrypted messages it is necessary that the recipient follows sender, or has sent a message to sender previously, or has accepted a Direct Message request from the sender before

Sending an encrypted message is quite simple, eligible users will see a toggle after clicking on the message icon to enable “encrypted” mode. Then they have to compose the message, select an eligible recipient, and click send.

Alternatively, users can send an encrypted message through the conversation settings page of an unencrypted conversation

  • Tap into an unencrypted conversation from inbox
  • Tap on  the information icon
  • Select “Start an encrypted message”

In encrypted conversations, a lock icon badge appears on the avatar of the user you are talking to. The badged avatar shows up in both the inbox and conversation views.

 The conversation info page also displays the label “Messages are encrypted” at the top of encrypted conversations.

The feature is still in the development phase, the company said that there are the following limitations:

  • encrypted messages can only be sent to a single recipient, group conversations are not yet supported.
  • cncryption of media and other attachments are not supported yet.
  • currently, new devices cannot join existing encrypted conversations.
  • users can only register a maximum of up to 10 devices to use encrypted direct messages (DMs).
  • currently, the company does not offer protections against man-in-the-middle attacks.
  • logging out from Twitter, all messages including encrypted messages on user current device will be deleted.
  • forward secrecy is not supported, this means that if the private key of a registered device was compromised, an attacker would be able to decrypt all of the encrypted messages that were sent and received by that device.

We are in the final!

Please vote for Security Affairs (https://securityaffairs.com/) as the best European Cybersecurity Blogger Awards 2022 – VOTE FOR YOUR WINNERS
Vote for me in the sections where is reported Securityaffairs or my name Pierluigi Paganini

Please nominate Security Affairs as your favorite blog.

Nominate Pierluigi Paganini and Security Affairs here here: https://docs.google.com/forms/d/e/1FAIpQLSepvnj8b7QzMdLh7vWEDQDqohjBUsHyn3x3xRdYGCetwVy2DA/viewform

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, encryption)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

MITRE revealed that nation-state actors breached its systems via Ivanti zero-days

The MITRE Corporation revealed that a nation-state actor compromised its systems in January 2024 by…

1 hour ago

FBI chief says China is preparing to attack US critical infrastructure

China-linked threat actors are preparing cyber attacks against U.S. critical infrastructure warned FBI Director Christopher…

14 hours ago

United Nations Development Programme (UNDP) investigates data breach

The United Nations Development Programme (UNDP) has initiated an investigation into an alleged ransomware attack…

16 hours ago

FIN7 targeted a large U.S. carmaker with phishing attacks

BlackBerry reported that the financially motivated group FIN7 targeted the IT department of a large…

1 day ago

Law enforcement operation dismantled phishing-as-a-service platform LabHost

An international law enforcement operation led to the disruption of the prominent phishing-as-a-service platform LabHost.…

1 day ago

Previously unknown Kapeka backdoor linked to Russian Sandworm APT

Russia-linked APT Sandworm employed a previously undocumented backdoor called Kapeka in attacks against Eastern Europe since…

2 days ago

This website uses cookies.