home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 1,662 of 2,445   
   Mike Powell to All   
   Is a new privacy protocol   
   21 Aug 25 08:36:55   
   
   TZUTC: -0500   
   MSGID: 1396.consprcy@1:2320/105 2d0c5c6b   
   PID: Synchronet 3.21a-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0   
   TID: SBBSecho 3.28-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   FORMAT: flowed   
   Is a new privacy protocol helping malicious actors more than Internet users?   
      
   Date:   
   Thu, 21 Aug 2025 08:48:45 +0000   
      
   Description:   
   Malicious sites are already taking advantage of the security blindspot to    
   gain a foothold among sites using ECH.   
      
   FULL STORY   
   ======================================================================   
      
   Encrypted Client Hello (ECH) is a security protocol designed to increase user   
   privacy by encrypting the content exchanged between clients and servers when   
   they are establishing a connection. Increased user privacy  whats not to    
   like?    
      
   Unfortunately, in the view of many enterprise security professionals, the   
   increased privacy promised by ECH could simultaneously reduce their ability    
   to detect and respond to threats. Widespread adoption of the security    
   protocol would severely curtail the ability of enterprises to identify and   
   block connections to malicious domains.    
      
   Late last year, our team at Corrata noticed an uptick in detections of an ECH   
   domain. The numbers were small  low thousands among hundreds of millions of   
   domain scans  but nonetheless intriguing. Did this herald the primetime   
   arrival of ECH? Would widely-used security tools soon be blind to large    
   swaths of internet traffic?    
      
   We recently studied billions of connections to web servers made by enterprise   
   employee mobile devices to answer these questions.   
      
   Here's what we found: How ECH works   
      
   Youve seen the padlock symbol and https designation in the address bar of    
   your browser. Both are indications that the website youre visiting uses the   
   Transport Layer Security (TLS) internet encryption standard, which protects   
   communications between an endpoint device and a web server. The vast majority   
   of internet traffic uses the TLS 1.3 standard  ECH was designed as an   
   extension to that standard.    
      
   Without ECH, a client will reveal the domain of the website its attempting to   
   visit before the encrypted connection is established. This means that any   
   entity that can see the users internet traffic  such as mobile operators,   
   Internet Service Providers (ISPs), enterprise security teams and bad actors   
   can see their destination, even when the user and the server take precautions   
   to avoid this.    
      
   ECH encrypts the entire Client Hello message (the first message sent by a   
   client in a TLS handshake) so that only the gateway to the intended server,   
   which holds the corresponding private key, can decrypt this inner message and   
   complete the handshake securely. Network observers can no longer see which   
   specific domain a user is trying to access.   
      
   Why does that matter?    
      
   Important cybersecurity tools like Secure Web Gateways and Next Generation   
   Firewalls rely on that visibility to detect and block access to content that   
   could represent a threat, such as phishing or malware download sites. Beyond   
   security teams, ISPs have a commercial interest in understanding how their   
   subscribers use the internet, and governments want to be able to passively   
   monitor and potentially restrict access to illegal, malicious, or    
   unacceptable content.    
      
   The visibility is particularly important for banks and other heavily    
   regulated industries that are often required to monitor their incoming and   
   outgoing internet traffic. As it stands, these organizations can decrypt   
   traffic selectively without looking at sensitive data like employee PII or   
   health records. But if ECH blocks filtering tools, banks will have to decrypt   
   all internet traffic in order to remain compliant with regulations  degrading   
   user privacy in the process.   
      
   ECH adoption is low, but risks remain for enterprises and users   
      
   Our analysis of the adoption and impact of ECH for enterprise users brought   
   good news and bad news. Although overall adoption is very low (more than 9%    
   of the top 1 million domains are ECH-enabled, but less than .01% of TLS   
   connections used the protocol), malicious actors are already taking advantage   
   of the anonymity the protocol provides: 17% of all ECH-enabled sites are   
   risky. Chrome users with encrypted DNS enabled are most at risk.    
      
   You might wonder if such a small portion of internet traffic matters. If less   
   than one-tenth of one percent of internet connections are using ECH, should   
   enterprise security teams even worry about the protocols potential risks?    
      
   The short answer is yes.    
      
   To work, ECH requires traffic to flow through a content delivery network (    
   CDN ) that supports the protocol. Cloudflare is currently the only CDN that   
   supports ECH, and the company has played an important role in driving ECH   
   adoption. (Notably, Apples iOS does not support ECH.)    
      
   We found that over 90% of phishing detections use Cloudflare infrastructure.   
   In addition to the ECH anonymity, these sites take advantage of other   
   Cloudflare features. For example, the captcha page can direct desktop traffic   
   to a legitimate site while mobile traffic is sent to a fake one.    
      
   We should expect ECH to grow in popularity over time, because there are   
   opportunities and incentives for both the server side and client side to    
   drive adoption. On the client side, Safari could support the standard or   
   Chrome could enable encrypted DNS by default.   
      
   Server side    
      
   On the server side, you would need to see wholesale migration to Cloudflare   
   (unlikely) or default support from other CDNs. Its worth noting that ECH   
   adoption is a positive for the CDNs. The complexity of implementation means   
   more websites will opt to use CDN services  and the CDNs would become the    
   only infrastructure players with widespread visibility of internet traffic.    
      
   For now, security teams can breathe a sigh of relief because the communitys   
   fears that enterprise internet traffic would go dark are not yet being   
   realized. But it would be irresponsible to expect this to continue long-term,   
   given the significant market opportunities that ECH adoption offers for the   
   CDN industry. The threat posed by the protocol must be taken seriously.    
      
   Tracking ECH and its cloak of secrecy is no longer optional for enterprise   
   security teams. Our data shows that while the potential certainly exists for   
   ECH to become a thorn in the side of defenders, this is the time to prepare   
   rather than panic.    
      
    This article was produced as part of TechRadarPro's Expert Insights channel   
   where we feature the best and brightest minds in the technology industry   
   today. The views expressed here are those of the author and are not   
   necessarily those of TechRadarPro or Future plc. If you are interested in   
   contributing find out more here:   
   https://www.techradar.com/news/submit-your-story-to-techradar-pro   
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/pro/is-a-new-privacy-protocol-helping-malicious-acto   
   rs-more-than-internet-users   
      
   $$   
   --- SBBSecho 3.28-Linux   
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/14 305 153/7715 154/110 218/700   
   SEEN-BY: 226/30 227/114 229/110 111 114 206 300 307 317 400 426 428   
   SEEN-BY: 229/470 664 700 705 266/512 291/111 320/219 322/757 342/200   
   SEEN-BY: 396/45 460/58 712/848 902/26 2320/0 105 304 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca