Matthew Rosenfeld, known as Moxie Marlinspike, is an American entrepreneur, cryptographer, and computer security researcher. Marlinspike is the creator of Signal, co-founder of the Signal Foundation, and serves as the CEO of Signal Messenger LLC. He is also a co-author of the Signal Protocol encryption used by Signal, WhatsApp, Facebook Messenger, and Skype.
Marlinspike is a former head of the security team at Twitter and the author of a proposed SSL authentication system replacement called Convergence. He previously maintained a cloud-based WPA cracking service and a targeted anonymity service called GoogleSharing.
Originally from the state of Georgia, Marlinspike moved to San Francisco in the late 1990s at the age of 18. He then worked for several technology companies, including enterprise infrastructure software maker BEA Systems Inc. In 2004, Marlinspike bought a derelict sailboat and, with three friends, refurbished it and sailed around the Bahamas while making a "video zine" about their journey called Hold Fast.
In 2010, Marlinspike was the chief technology officer and co-founder of Whisper Systems, an enterprise mobile security startup company. In May 2010, Whisper Systems launched TextSecure and RedPhone. These were applications that provided end-to-end encrypted SMS messaging and voice calling, respectively. Twitter acquired the company for an undisclosed amount in late 2011. The acquisition was done "primarily so that Mr. Marlinspike could help the then-startup improve its security". During his time as Twitter's head of cybersecurity, the firm made Whisper Systems' apps open source.
Marlinspike left Twitter in early 2013 and founded Open Whisper Systems as a collaborative open source project for the continued development of TextSecure and RedPhone. At the time, Marlinspike and Trevor Perrin started developing the Signal Protocol, an early version of which was first introduced in the TextSecure app in February 2014. In November 2015, Open Whisper Systems unified the TextSecure and RedPhone applications as Signal. Between 2014 and 2016, Marlinspike worked with WhatsApp, Facebook, and Google to integrate the Signal Protocol into their messaging services.
In a 2009 paper, Marlinspike introduced the concept of SSL stripping, a man-in-the-middle attack in which a network attacker could prevent a web browser from upgrading to an SSL connection in a way that would likely go unnoticed by a user. He also announced the release of a tool,
sslstrip, that would automatically perform these types of man-in-the-middle attacks. The HTTP Strict Transport Security (HSTS) specification was subsequently developed to combat these attacks.
SSL implementation attacksEdit
Marlinspike has discovered a number of different vulnerabilities in popular SSL implementations. Notably, he published a 2002 paper on exploiting SSL/TLS implementations that did not correctly verify the X.509 v3 "BasicConstraints" extension in public key certificate chains. This allowed anyone with a valid CA-signed certificate for any domain name to create what appeared to be valid CA-signed certificates for any other domain. The vulnerable SSL/TLS implementations included the Microsoft CryptoAPI, making Internet Explorer and all other Windows software that relied on SSL/TLS connections vulnerable to a man-in-the-middle attack. In 2011, the same vulnerability was discovered to have remained in the SSL/TLS implementation on Apple Inc.'s iOS. Also notably, Marlinspike presented a 2009 paper in which he introduced the concept of a null-prefix attack on SSL certificates. He revealed that all major SSL implementations failed to properly verify the Common Name value of a certificate, so that they could be tricked into accepting forged certificates by embedding null characters into the CN field.
Solutions to the CA problemEdit
In 2011, Marlinspike presented a talk, "SSL And The Future Of Authenticity", at the Black Hat security conference in Las Vegas. He outlined many of the problems with certificate authorities and announced the release of a software project called Convergence to replace them. In 2012, Marlinspike and Perrin submitted an Internet Draft for TACK, which is designed to provide SSL certificate pinning and help solve the CA problem, to the Internet Engineering Task Force.
In 2012, Marlinspike and David Hulton presented research that makes it possible to reduce the security of MS-CHAPv2 handshakes to a single DES encryption. Hulton built hardware capable of cracking the remaining DES encryption in less than 24 hours, and the two made the hardware available for anyone to use as an Internet service.
Mobily surveillance controversyEdit
In 2013, Marlinspike published emails on his blog that he claimed were from Saudi Arabian telecom service Mobily soliciting his help in surveilling their customers, including intercepting communications running through various applications. Marlinspike refused to help, making the emails public instead. Mobily denied the allegations. "We never communicate with hackers", the company said.
Marlinspike says that when flying within the United States he is unable to print his own boarding pass, is required to have airline ticketing agents make a phone call in order to issue one, and is subjected to secondary screening at TSA security checkpoints.
While entering the U.S. on a flight from the Dominican Republic in 2010, Marlinspike was detained by federal agents for nearly five hours, all his electronic devices were confiscated, and at first agents claimed he would only get them back if he provided his passwords so they could decrypt the data. Marlinspike refused to do this, and the devices were eventually returned, though he noted that he could no longer trust them, saying, "They could have modified the hardware or installed new keyboard firmware."
- DEF CON 17: "More Tricks for Defeating SSL"
- DEF CON 18 and Black Hat 2010: "Changing Threats to Privacy"
- DEF CON 19 and Black Hat 2011: "SSL and the Future of Authenticity"
- DEF CON 20: "Defeating PPTP VPNs and WPA2 with MS-CHAPv2"
- Webstock '15: "Making private communication simple"
- 36C3: "The ecosystem is moving"
- In 2013 and 2014, the Shuttleworth Foundation provided Marlinspike with a total of $289,487.18 in funding for Open Whisper Systems.
- In 2016, Fortune magazine named Marlinspike among its 40 under 40 for being the founder of Open Whisper Systems and "[encrypting] the communications of more than a billion people worldwide". Wired also named Marlinspike to its "Next List 2016," as one of "25 Geniuses Who Are Creating the Future of Business."
- In 2017, Marlinspike and Perrin were awarded the Levchin Prize for Real World Cryptography "for the development and wide deployment of the Signal protocol".
- Wiener, Anna (October 19, 2020). "Taking Back Our Privacy : Moxie Marlinspike, the founder of the end-to-end encrypted messaging service Signal, is "trying to bring normality to the Internet."". The New Yorker. Retrieved October 27, 2020.
- Smith, Matt (May 15, 2013). "Saudi's Mobily denies asking for help to spy on customers". Reuters. Retrieved February 21, 2018.
- Rosenblum, Andrew (April 26, 2016). "Moxie Marlinspike Makes Encryption for Everyone". Popular Science. Bonnier Corporation. Retrieved July 9, 2016.
- Greenberg, Andy (July 31, 2016). "Meet Moxie Marlinspike, the Anarchist Bringing Encryption to All of Us". Wired. Condé Nast. Retrieved July 31, 2016.
- Greenberg, Andy (October 4, 2016). "You can finally encrypt Facebook Messenger, so do it". Wired.
- Newman, Lily Hay (January 11, 2018). "Skype Finally Starts Rolling Out End-to-End Encryption". Wired.
- Hern, Alex (October 17, 2014). "Twitter's former security head condemns Whisper's privacy flaws". The Guardian. Retrieved January 22, 2015.
- Messmer, Ellen (October 12, 2011). "The SSL certificate industry can and should be replaced". Network World. IDG. Archived from the original on March 1, 2014. Retrieved September 25, 2016.
- "New Cloud-Based Service Steals Wi-fi Passwords". PC World. Retrieved December 9, 2013.
- "A Better Way To Hide From Google". Forbes. November 25, 2013. Archived from the original on October 12, 2013. Retrieved December 9, 2013.
- Yadron, Danny (July 9, 2015). "Moxie Marlinspike: The Coder Who Encrypted Your Texts". The Wall Street Journal. Archived from the original on July 10, 2015. Retrieved September 27, 2016.
- Mills, Elinor (March 15, 2011). "CNet: WhisperCore App Encrypts All Data For Android". News.cnet.com. Retrieved December 9, 2013.
- "Twitter Acquires Moxie Marlinspike's Encryption Startup Whisper Systems". Forbes. Retrieved October 4, 2013.
- Powers, Shawn M.; Jablonski, Michael (February 2015). The Real Cyber War: The Political Economy of Internet Freedom. University of Illinois Press. p. 198. ISBN 978-0-252-09710-2. JSTOR 10.5406/j.ctt130jtjf.
- Chris Aniszczyk (December 20, 2011). "The Whispers Are True". The Twitter Developer Blog. Twitter. Archived from the original on October 24, 2014. Retrieved January 22, 2015.
- "RedPhone is now Open Source!". Whisper Systems. July 18, 2012. Archived from the original on July 31, 2012. Retrieved January 22, 2015.
- Yadron, Danny (July 10, 2015). "What Moxie Marlinspike Did at Twitter". Digits. The Wall Street Journal. Archived from the original on March 18, 2016. Retrieved September 27, 2016.
- Andy Greenberg (July 29, 2014). "Your iPhone Can Finally Make Free, Encrypted Calls". Wired. Retrieved January 18, 2015.
- "A New Home". Open Whisper Systems. January 21, 2013. Retrieved July 11, 2015.
- Donohue, Brian (February 24, 2014). "TextSecure Sheds SMS in Latest Version". Threatpost. Retrieved July 14, 2016.
- Greenberg, Andy (November 2, 2015). "Signal, the Snowden-Approved Crypto App, Comes to Android". Wired. Condé Nast. Retrieved November 24, 2015.
- Metz, Cade (April 5, 2016). "Forget Apple vs. the FBI: WhatsApp Just Switched on Encryption for a Billion People". Wired. Condé Nast. Retrieved August 2, 2016.
- Greenberg, Andy (July 8, 2016). "'Secret Conversations:' End-to-End Encryption Comes to Facebook Messenger". Wired. Condé Nast. Retrieved September 24, 2016.
- Greenberg, Andy (May 18, 2016). "With Allo and Duo, Google Finally Encrypts Conversations End-to-End". Wired. Condé Nast. Retrieved September 24, 2016.
- Marlinspike, Moxie; Acton, Brian (February 21, 2018). "Signal Foundation". Signal.org. Retrieved February 21, 2018.
- "sslstrip". Thoughtcrime.org. Retrieved December 9, 2013.
- Greenberg, Andy (February 18, 2009). "Breaking Your Browser's Padlock". Forbes. Archived from the original on February 27, 2014.
- Kelly Jackson Higgins February 24, 2009 (February 24, 2009). "SSLStrip Hacking Tool Released". Darkreading.com. Retrieved December 9, 2013.
- "BasicConstraints Vulnerability". Retrieved December 9, 2013.
- Apple iOS Bug Worse Than Advertised/
- "iPhone data interception tool released". Scmagazine.com.au. July 27, 2011. Archived from the original on December 14, 2013. Retrieved December 9, 2013.
- "More New Tricks For Defeating SSL In Practice". Youtube.com. January 15, 2011. Retrieved December 9, 2013.
- Zetter, Kim (July 30, 2009). "Vulnerabilities Allow Attackers To Impersonate Any Website". Wired.com. Retrieved December 9, 2013.
- Goodin, Dan (July 30, 2009). "Wildcard certificate spoofs web authentication". Theregister.co.uk. Retrieved December 9, 2013.
- "SSL And The Future Of Authenticity". Youtube.com. August 18, 2011. Retrieved December 9, 2013.
- "New SSL Alternative". Informationweek.com. Archived from the original on October 1, 2011. Retrieved December 9, 2013.
- "Future of SSL in doubt?". Infosecurity-magazine.com. August 9, 2011. Retrieved December 9, 2013.
- "Trust Assertions For Certificate Keys". Tack.io. Retrieved December 9, 2013.
- Goodin, Dan (May 23, 2012). "SSL fix flags forged certificates". Arstechnica.com. Retrieved December 9, 2013.
- "New Tool From Moxie Marlinspike Cracks Some Crypto Passwords". threatpost. August 19, 2012. Archived from the original on August 19, 2012.CS1 maint: bot: original URL status unknown (link)
- Mills, Elinor (November 18, 2010). "Security researcher: I keep getting detained by feds". CNET. Retrieved June 19, 2019.
- Zetter, Kim (November 18, 2010). "Another Hacker's Laptop, Cellphones Searched At Border". Wired.com. Retrieved June 19, 2019.
- "DEF CON 17 - Moxie Marlinspike - More Tricks for Defeating SSL". YouTube. DEF CON. Retrieved January 22, 2015.
- "DEF CON 18 - Moxie Marlinspike - Changing Threats To Privacy: From TIA to Google". YouTube. DEF CON. Retrieved January 22, 2015.
- "DEF CON 19 - Moxie Marlinspike - SSL And The Future Of Authenticity". YouTube. DEF CON. Retrieved January 22, 2015.
- "DEF CON 20 - Marlinspike Hulton and Ray - Defeating PPTP VPNs and WPA2 Enterprise with MS-CHAPv2". YouTube. DEF CON. Retrieved January 22, 2015.
- "Webstock '15: Moxie Marlinspike - Making private communication simple". Vimeo. Webstock. Retrieved April 22, 2015.
- "36C3 - The ecosystem is moving". media.ccc.de. 36C3. Retrieved January 6, 2020.
- "Moxie Marlinspike". Shuttleworth Foundation. n.d. Archived from the original on November 15, 2016. Retrieved September 25, 2016.
- "Moxie Marlinspike - 40 under 40". Fortune. Time Inc. 2016. Retrieved September 22, 2016.
- Staff, WIRED (April 26, 2016). "25 Geniuses Who Are Creating the Future of Business". Wired. ISSN 1059-1028. Retrieved March 19, 2020.
- "The Levchin Prize for Real World Cryptography". RealWorldCrypto.
- Levchin, Max (January 4, 2017). "2017 Levchin Prize for Real World Cryptography". Yahoo! Finance. Retrieved February 7, 2018.