Hacker News new | past | comments | ask | show | jobs | submit login
A warrant showing the U.S. government is monitoring push notifications (404media.co)
216 points by PaulHoule on Dec 10, 2023 | hide | past | favorite | 83 comments



Extensive discussion (>600 comments) last week: https://news.ycombinator.com/item?id=38543155


This has news. Last week just reported on Senator Ron Wyden's letter, this article has concrete data from court orders and warrants.


I didn't flag it as a dupe, just helpful to have links between discussion threads (and try to avoid beating dead horses, although that's always a lost cause).


Apple and Google have been recommending that actual data not be sent through these push notifications and only a “ping” for the app to go check the source of truth.

Maybe it’s time to actually enforce this and remove the ability for arbitrary content to be sent?


Ah I wonder if that's why notifications don't work when I force stopped an app


In effect, yes. The notification delegates in Swift only call the notification callbacks if you tap the specific notification (if you just go to the App the notification callbacks are not fired)


Oh I was thinking of Android actually.


You'd need some amount of arbitrary data (the copy) so the user knows what kind of content they can expect.


Nope, these notifications don’t always turn into a user-visible notification.


This is the third time in a week that I read about this and, to me, the most important question has remained unanswered: If a push notification's payload is E2E-encrypted (consider, e.g., push notifications for Signal running on GrapheneOS with sandboxed Google Play Services), is there still a data leak? Like, what metadata are people referring to? The fact that I use Signal at all?

Of course, depending on the app, it coupd be possible to correlate even E2E-encryped push notifications with other data on that app's backend server etc. But beyond specific apps is there a generic vulnerability here?


The data leak, more of an oracle than anything else, is that you have an active account with the business sending the push. And it's not really even a data leak because it's data generated in the course of activity the user has requested.


> is that you have an active account with the business sending the push

But they wouldn't need to analyze push notifications for that, they could simply ask Google/Apple who installed a given app.


The approximate size of the payload, the application, the time, maybe where you received it (if you were on a cellular network). All of this has a lot of value. You don't exactly need the message or the recipient.


What value does it have?

The payload of Signal's push notifications should have roughly the same length every time as they are only used to wake up the app. The time I receive a push notification doesn't depend on me, but on when my contacts send messages. (Yes, you could use this to narrow down someone's time zone but not much more than that. Plus there are a million other ways to determine the time zone.)


Let’s say you are a married politician and I know you use gay hookup apps regularly.

I now have enough information to either blackmail you further or end your career.


I don't still understand what risk push notifications represent here. Google & Apple maintain a list of all your apps, anyway. Any government can easily subpoena that list without having to put in much effort or analyze push notifications.


> Like, what metadata are people referring to?

Time of day that you're awake/active, the frequency of message push notifications vs your travel patterns when you might be expected to be offline, weekday vs weekend message traffic volumes per day, traffic volumes on holidays, all these sorts of things are valuable metadata for an NSA-like organization.


> Time of day that you're awake/active, […] your travel patterns when you might be expected to be offline

But the push notifications I receive through Signal don't tell you any of those things?


Good to see Threema are ahead of the game, they anticipated the scenario and have been using encrypted notifications for some time now[1].

[1]https://threema.ch/en/faq/privacy_push


Signal doesn't even send the message via push notifications.


> Signal doesn't even send the message via push notifications.

Threema doesn't send the message in the notification either, per the link.


How to protect yourself? Is disabling notifications locally a good countermeasure?


Depends on how deeply you want to protect yourself.

Disabling push notifications would help, especially if you disable notifications through individually app settings first. That should make sure an app doesn't continue trying to send notifications entirely, if you just disable notifications globally Apple or Google may still see notifications that they just don't route to your device.

If you really want better protection, use GrapheneOS or a similar de-Googled android device and don't install any Google services. That's the best way to still have a modern smartphone with limited risk that Apple or Google is somehow tracking most use.


I'm unconvinced that graphene is safe with the behavioral problems it's leadership has shown.


Yep I don't blame you, I've heard that from others as well.

Personally I see Graphene as a lesser of two evils compared to the guaranteed spying of Apple and Google for anyone that can't avoid having a smartphone all together.


Depends. Since Apple/Google are monitoring it on their end, and I believe (at least on Android) turning off notifications at the OS level just blocks it from showing on your phone, these would still be sniffable.

If the application in question has the ability to disable notifications inside the application itself, that should work.


You stop using your cell phone for anything important, or anything that can't be gotten through other means trivially.

Practically, this means you use your cell phone for phone calls (the metadata is public, and I assume anyone who wants to listen in can already do so), and for SMS/MMS messages (see above, except I don't think the contents are quite as protected as voice).

You disable location services, you don't install anything of any interest on your "daily carry" phone, and you regularly shut it down for periods of time to build the expectation that your device is regularly offline. Let it run out of battery. Cultivate the "senile old senior" approach to using your phone. Leave it behind.

And then carry a small laptop, preferably running Qubes, for "everything else," and either use Tor or your own VPN infrastructure (ideally shared with friends) for access.

... and start cultivating ways of life that are offline first, that don't rely on consumer electronics (or the upstream companies) to behave as anything other than the data-grubbing, data-selling sorts they've reliably proven to be.

Yeah. It sucks. The past 20 years of consumer electronics turn out to have been rotten on the vine, actively working against your own interests, comically insecure (so even if they're not just streaming your data off to whoever pays/demands, it's not hard to extract), etc.

I don't have any better answers. I've been trying for about the last 5 years to figure out a solution, and I just can't come up with anything reasonable that still involves using consumer electronics for much more than toy uses. Apple looked better for a while, but then lost their head with the on-device CSAM scanning stuff and, while I like it, Lockdown is a simple admission that they cannot build secure software against nation-state level adversaries. Plus, most of their updates are "Oh, yeah, so, update this now, we have reason to believe [solid proof and won't say it, usually...] that this fixes things under active exploit." But, hey, we've got MeMojis and such now!

We have built too much complexity into our systems (see all the uarch vulns that are fundamentally a result of chasing performance over everything) to understand, to reason about, and we can't fix the problems of complexity with yet more complexity (as the last 5 years of papers demonstrate, often to comedic effect, about how the uarch vuln mitigations open up this other channel). And the software isn't any better.

I don't see the path forward other than simply opting out, and building systems that no longer rely on vulnerable pocket computers that leak literally everything you're doing to whoever might care.


The US have -among others- a privacy regulations problem, little regulations to protect users privacy and many more to violate it, as much as the direct blame is on big tech, but the real blame should be toward who you have voted for, and you - US citizen- ultimately for voting for someone not working for your interests.


Looks like it's time to finally dive into setting up ntfy and UnifiedPush for my stuff.


Already had ntfy set up and took the time to setup MollySocket so I can get signal notifications without firebase or a dedicated websocket connection (even if no message data is included). Here's to hoping more apps are brought on board.

I also love ntfy for its general handiness.


I bridge my Signal communications through my self-hosted Matrix server, so I'm already going to get the benefit of Signal not going through Google's servers.

That said, MollySocket is a pretty neat hack that I had never heard of until now. I'll keep it in mind for a future use.


I don't know UnifiedPush so I can't compare, but ntfy is an absolute gem.

I have it on my personal server, configuration is easy and the app is available on degoogled phones and works perfectly.

Just look at the doc on Github, most professional software don't have such a well done doc.


I wish RocketChat supported UnifiedPush.


Yes but good apps do encrypt it already


Maybe I’m confused but the warrant seems to suggest they’re not monitoring them. It’s asking for the notifications. If they were monitoring them, they wouldn’t need to subpoena them.


Parallel construction?


What does that mean?


https://en.wikipedia.org/wiki/Parallel_construction

In the US, a particular form is evidence laundering, where one police officer obtains evidence via means that are in violation of the Fourth Amendment's protection against unreasonable searches and seizures, and then passes it on to another officer, who builds on it and gets it accepted by the court under the good-faith exception as applied to the second officer. This practice gained support after the Supreme Court's 2009 Herring v. United States decision.

See also the sibling about Fruit of the Poisonous Tree, the principle of law that Parallel Construction has rendered moot.


Math nerd observation:

reminds me of algebra equation solving encountering square root of -1, then naming it an introduced variable “i”, rather than being stuck, and moving on, in hopes “i” vanishes later in the set of equations being solved or simplified.


They already know through either inadmissible means or outright illegal ones or they don't want you to know their capabilities.

So now they go the official way. They already know exactly where to look and what to look for and what to ask for.


https://en.wikipedia.org/wiki/Fruit_of_the_poisonous_tree

Illegally obtained evidence can't be used, so they must build the story using only legal means, which can be difficult and take longer or not possible at all sometimes.


haha

That rule been so undermined in so many respects that is has little effect.

When the government illegally spies on the public it goes in knowing that it has to cover for its actions.

The evidence rules tend to only catch genuine errors where they failed to do the required parallel construction or set things up for the inevitable discovery doctrine because the unlawful search was inadvertent rather than intentional.


Learn something from illegal/inadmissible/secret source, use that info to find other evidence you can actually present in a public court, that you otherwise might not have found.


it means that they are trying to hide being criminals... (the government)... look it up on wikipedia

https://en.wikipedia.org/wiki/Parallel_construction

AGAB

All Governements Are Bastards


If they request a warrant also, then they can actually use the results in a court process?


Standard tinfoil hatter stuff - it is impossible to prove the government is not monitoring everything. From there you can build any theory - one being the government finds out you are doing something illegal, and then they go back and find legal ways to prove it.

Has this happened - probably. Does it happen a lot - probably not. But none of that matters - the uncertainty is enough to build a whole online community that believes hard.


Are push notifications sent in plain text?


For most applications, yes. They are only encrypted in transit via HTTPS, but they are readable to Google/Apple.

It's possible to E2EE push notifications, but you need custom application logic.


Wouldn’t it be pretty simple to do that though if you wanted to?

Send the push without content, or with just an identifier, and then have the app go get that message from the database and show it.


On iOS historically, you needed a special dispensation for your app to run when a push is received. So your choice was to let Apple see the content, or to have a push like 'you've got a new message'. I don't know the current status, but this used to be called a voip push or silent push; and Apple kept track to make sure you were at least posting notifications, otherwise future notifications would be dropped/delayed.

A lot of apps clearly do notifications separately from content though: you'll get a notification, but when you tap on it, the content has to load.


Show me any large US ISP, and I'll find you a locked room few know about with government network sniffers that sit at the head of all regional traffic to get a copy of everything going in and out there. Everyone does it, but like fight club, no one talks about it. If they're not in yours, it's because they've already gotten upstream of traffic to see it all anyways.

The problem comes with sifting through the data, but now that you have tireless AI doing that work for tired humans, who's to say what they actually don't see.


Doesn't even have to be big.

Years back I was touring a local datacenter that was more than a bit quirky, but their offer was basically that they had fiber loops into the main carrier hotel a few blocks away. This was useful because the guy than ran the carrier hotel wouldn't even return your email unless you were from BigCo.

But anyhow, walking around he pointed out one cage and said something like "And that's the NSA's cage, we don't ask what they do haw haw." At the time I mostly thought he was just exaggerating or joking around. But later after revelations of the scale of bulk collection I had to wonder if it really was true and simply banally that much in the open.


Room 641A was known to the security community long before the Snowden leaks.


So much was revealed in the European Parliament's ECHELON report back in 2000 that I found it hard to understand why Snowden made the big splash that he did. It all seemed pretty old hat to me.


The chattering classes love counter-cultural packaging. That is why they embraced Greta Thunberg much more than they embraced Al Gore despite the messaging being the same.

The ECHELON report revelations were packaged into a formal (boring) European Parliament report. Meanwhile Edward Snowden had the counter-cultural packaging of a cool dissident hacker.


And the Utah data center that stores days worth of the entire Internet and then they just keep the most interesting parts and the parts they can't hack into for later analysis.

https://en.wikipedia.org/wiki/Utah_Data_Center


In fact it even had a Wikipedia article a number of years before them: https://en.wikipedia.org/w/index.php?title=Room_641A&oldid=6...


In 2006, Mark Klein working for AT&T leaked it. It was in the news.

Snowden did his leak way later in 2013.


Hah, I only say large as anything smaller they're already getting you somewhere at your provider's provider.


At least as of a few years ago, AT&T still owned most of the core network in the US and leased it out to other ISPs. The government has a direct pipe into AT&T which allowed (still does?) them to sniff everything regardless of ISP since AT&T almost certainly owned the underlying pipe.


The government spooks aren’t at the ISP level…remember the AT&T whistleblower…

https://www.wired.com/2006/05/att-whistle-blowers-evidence/


could see these "statistics" being used to gauge to public response to political decisions. That's pretty dystopian. "President Biden, the 'data' shows your response to Palestine was not very popular".


This world where the people running the government care what the populace thinks about their decisions reads like a utopian fantasy.


It's not popular with me. We should be providing Israel with far more JDAMs.


Nobody should be surprised. I think most people are familiar with Murphy's law


Where are the popular personalities telling people to not use VPNs? I swear sometimes I theorize about gov agencies using people to spread insecurities like that.

VPN providers that are run by reputable people/orgs and make security promises are liable to lawsuits and criminal prosecution if they sniff your traffic or sell info about you, unlike ISPs complying with gov requests/partnerships and who want another revenue stream by selling your info to the highest bidder with no specific privacy guarantees.


I renew my question of why this is surprising or objectionable. "Pen register" surveillance has been a thing that applies to actual mail, email, telephone networks, IP networks, and any other thing with a real or metaphorical envelope.


> I renew my question of why this is surprising or objectionable.

It's surprising because the government doesn't exactly talk about it a lot. Thus, most people who don't follow security issues don't hear about it very often. It's not like the government advertises these activities with billboards and TV spots. The reason they don't is because this broad interpretation of their responsibilities makes them look pretty bad without having a long discussion with a lot of context. As it is, people might just ask them to stop reading their emails. So, if the people doing it don't talk about it, why would you be surprised that other people don't know it's happening? It sounds like you're saying "I'm surprised that not everybody pays careful attention to the specific domains I pay attention to", but remember that it takes all kinds of people to make the world go round.


It shouldn't be surprising to anybody that has been paying even a small amount of attention to the results of Snowden releases.

They might not talk about it but one agency or another has been consuming all digital traffic since at least the late 90s.

https://en.wikipedia.org/wiki/Carnivore_%28software%29?wprov...


This isn't the police reading your emails. It is envelope metadata (to/from). This type of surveillance is not even a search under the 4th Amendment (Smith v. Maryland). Having a warrant makes the activities described in the article completely legitimate. It is the definition of "due process".


It may not be a search under that case, but plenty of folks disagree with that assessment. It's not like the telcos publish metadata for anyone to read. It is private data, and the fact that government officers think they have carte blanche to get it, and worse, can find judges that agree with them, is disagreeable to a significant portion of the population.

Is it warranted (figuratively, not literally) in this instance? Perhaps. But nonetheless, it re-opens the conversation about the wider implications about warrantless searches.


That isn't the discussion that HN seems to be having though. The idea that a court cannot order a search is an extreme, fringe position.


> It is envelope metadata (to/from).

Right, but!

That's what the conversation would be about, without a long discussion and a lot of context. That's why we don't have the conversation: it's too hard, and people would just say "stop listening to my phone calls, you government perverts". And because we don't have that conversation, it's a surprise when things like this come up.


Automatization has made it possible to do all these stuff at such a scale that Google can spy on everyone all the time.

Stasi was limited by that the whole of DDR can't work at Stasi.

Instead of the government joining in on the fun, maybe it would be good to e.g. close down Google (split up the spy and search parts, which essentially is closing down Google since they have relatively nothing without the spying).


You obviously do not have a realistic appreciation for the scale or centralization of the post office or AT&T, nor any understanding of American 4th Amendment jurisprudence. If the only thing you bring to the discussion is an equivalation of Google and Apple with the Stasi, that's nothing more than fulfilling a variant of Godwin's Law.


He said Stasi was limited so it is not equivalation. The US government and its infrastructure oligopolies monitor citizens far more than the Stasi ever did. We are pleading to a reduction down to a Stasi-like intelligence service.

Tangentially, J. Edgar Hoover was politically opposed to feminism, and COINTELPRO had a massive secret police action against feminists and feminist groups in the 1970s. Some of us want these issues hashed out at the ballot box, not by some giant secret political police force.


In what way is COINTELPRO related to a court-ordered pen register?


…in the way governments want the data to extend control…

SMH


The answer can be found in the first word of the statement.


Benevolent surveillance is a waiting period before malevolent manipulation.

Study history.


Really?!

The US Gov kept a record of all the metadata of every letter sent through the USPS?


https://en.m.wikipedia.org/wiki/Mail_cover

> Since 2001, the Postal Service has been effectively conducting mail covers on all American postal mail as part of the Mail Isolation Control and Tracking program.[1]

https://en.m.wikipedia.org/wiki/Mail_Isolation_Control_and_T...


No, and they don't keep a record of all APNS traffic, either. They get a court to order the push operator to log the envelope metadata of messages to and from enumerated parties who are the subject of the warrant.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: