Hide metadata

dc.date.accessioned2021-08-04T15:43:04Z
dc.date.available2021-08-04T15:43:04Z
dc.date.created2021-07-12T09:33:47Z
dc.date.issued2021
dc.identifier.citationJohansen, Christian Mujaj, Aulon Arshad, Hamed Noll, Josef . The Snowden Phone: A Comparative Survey of Secure Instant Messaging Mobile Applications. Security and Communication Networks. 2021
dc.identifier.urihttp://hdl.handle.net/10852/86676
dc.description.abstractIn recent years, it has come to attention that governments have been doing mass surveillance of personal communications without the consent of the citizens. As a consequence of these revelations, developers have begun releasing new protocols for end-to-end encrypted conversations, extending and making popular the old Off-the-Record protocol. New implementations of such end-to-end encrypted messaging protocols have appeared, and several popular chat applications have been updated to use such protocols. In this survey, we compare six existing applications for end-to-end encrypted instant messaging, namely, Signal, WhatsApp, Wire, Viber, Riot, and Telegram, most of them implementing one of the recent and popular protocols called Signal. We conduct five types of experiments on each of the six applications using the same hardware setup. During these experiments, we test 21 security and usability properties specially relevant for applications (not protocols). The results of our experiments demonstrate that the applications vary in terms of the usability and security properties they provide, and none of them are perfect. In consequence, we make 12 recommendations for improvement of either security, privacy, or usability, suitable for one or more of the tested applications.
dc.languageEN
dc.rightsAttribution 4.0 International
dc.rights.urihttps://creativecommons.org/licenses/by/4.0/
dc.titleThe Snowden Phone: A Comparative Survey of Secure Instant Messaging Mobile Applications
dc.typeJournal article
dc.creator.authorJohansen, Christian
dc.creator.authorMujaj, Aulon
dc.creator.authorArshad, Hamed
dc.creator.authorNoll, Josef
cristin.unitcode185,15,5,25
cristin.unitnamePROG Programmering
cristin.ispublishedtrue
cristin.fulltextoriginal
cristin.qualitycode1
dc.identifier.cristin1921408
dc.identifier.bibliographiccitationinfo:ofi/fmt:kev:mtx:ctx&ctx_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.jtitle=Security and Communication Networks&rft.volume=&rft.spage=&rft.date=2021
dc.identifier.jtitleSecurity and Communication Networks
dc.identifier.volume2021
dc.identifier.pagecount30
dc.identifier.doihttps://doi.org/10.1155/2021/9965573
dc.identifier.urnURN:NBN:no-89312
dc.type.documentTidsskriftartikkel
dc.type.peerreviewedPeer reviewed
dc.source.issn1939-0114
dc.identifier.fulltextFulltext https://www.duo.uio.no/bitstream/handle/10852/86676/1/SCN-9965573.pdf
dc.type.versionPublishedVersion
cristin.articleid9965573


Files in this item

Appears in the following Collection

Hide metadata

Attribution 4.0 International
This item's license is: Attribution 4.0 International