Close Menu
TechBrunchTechBrunch
  • Home
  • AI
  • Apps
  • Crypto
  • Security
  • Startups
  • TechCrunch
  • Venture

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Pulley, 645 Venture, and Epigram Legal disrupt the 2025 agenda

September 5, 2025

X offers me an end-to-end encrypted chat – you probably shouldn't trust it yet

September 5, 2025

Learn to create communities and businesses that continue in 2025

September 5, 2025
Facebook X (Twitter) Instagram
TechBrunchTechBrunch
  • Home
  • AI

    OpenAI seeks to extend human lifespans with the help of longevity startups

    January 17, 2025

    Farewell to the $200 million woolly mammoth and TikTok

    January 17, 2025

    Nord Security founder launches Nexos.ai to help enterprises move AI projects from pilot to production

    January 17, 2025

    Data proves it remains difficult for startups to raise capital, even though VCs invested $75 billion in the fourth quarter

    January 16, 2025

    Apple suspends AI notification summaries for news after generating false alerts

    January 16, 2025
  • Apps

    Google brings Pixel 6 and new devices to Material3 Expressive, along with other features, to the Pixel 6 and new devices

    September 3, 2025

    Google's NoteBookLM now allows you to customize the tone of your AI podcasts

    September 3, 2025

    Roblox expands the use of age estimation techniques and introduces standardized assessments

    September 3, 2025

    Instagram finally launches the iPad app

    September 3, 2025

    Complete the 2025 Confusion Builder Stage Agenda with the Maximum Scaling Voice

    September 3, 2025
  • Crypto

    Stripe will showcase who WHO including Humanity, Openai and Paradigm to build a new blockchain

    September 4, 2025

    Coinbase CEO explains why he fired an engineer who didn't try AI right away

    August 22, 2025

    Your next customer is destroying the 2025 Expo floor

    August 19, 2025

    Crypto Company Gemini File for Winklevoss Twins IPO

    August 16, 2025

    North Korean spies pretending to be remote workers have invaded hundreds of businesses, CloudStrike says

    August 4, 2025
  • Security

    X offers me an end-to-end encrypted chat – you probably shouldn't trust it yet

    September 5, 2025

    Venezuelan president believes that American spies cannot hack Huawei's phones

    September 3, 2025

    ICE revitalizes its contract with Spyware Maker Paragon

    September 2, 2025

    WhatsApp fixes a “zero click” bug used to hack Apple users with spyware

    August 29, 2025

    According to Transunion, hackers say they stole the personal information of 4.4 million customers

    August 28, 2025
  • Startups

    7 days left: Founders and VCs save over $300 on all stage passes

    March 24, 2025

    AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

    March 24, 2025

    20 Hottest Open Source Startups of 2024

    March 22, 2025

    Andrill may build a weapons factory in the UK

    March 21, 2025

    Startup Weekly: Wiz bets paid off at M&A Rich Week

    March 21, 2025
  • TechCrunch

    OpenSea takes a long-term view with a focus on UX despite NFT sales remaining low

    February 8, 2024

    AI will save software companies' growth dreams

    February 8, 2024

    B2B and B2C are not about who buys, but how you sell

    February 5, 2024

    It's time for venture capital to break away from fast fashion

    February 3, 2024

    a16z's Chris Dixon believes it's time to focus on blockchain use cases rather than speculation

    February 2, 2024
  • Venture

    Pulley, 645 Venture, and Epigram Legal disrupt the 2025 agenda

    September 5, 2025

    Learn to create communities and businesses that continue in 2025

    September 5, 2025

    Today is the last chance to showcase in 2025

    September 5, 2025

    Ted Leader's $300 million “Valley of Death” Fund may come with the needs of late climate technology

    September 4, 2025

    Roelof Botha from Sequoia Capital is beginning to disrupt 2025

    September 4, 2025
TechBrunchTechBrunch

X offers me an end-to-end encrypted chat – you probably shouldn't trust it yet

TechBrunchBy TechBrunchSeptember 5, 20254 Mins Read
Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
Share
Facebook Twitter LinkedIn Pinterest Telegram Email


Formerly Twitter, X has begun rolling out a new encrypted messaging feature called “chat” or “XChat.”

The company claims that the new communications capabilities are end-to-end encrypted. This means that the exchanged message can only be read by the sender and its recipient, and in theory no one else can access it, including X.

However, encryption experts have warned that we should not trust the current implementation of X's current encryption in XChat. They say that when it comes to end-to-end encrypted chat, it's much worse than Signal, a technology that widely considered the latest in art.

In Xchat, when a user clicks “Set Up Now”, X will prompt you to create a 4-digit pin. This is used to encrypt the user's private key. This key is stored on X's server. A private key is essentially a private encryption key assigned to each user and serves the purpose of decrypting the message. Like many end-to-end encrypted services, the private key is paired with the public key. This is what the sender uses to encrypt the message to the receiver.

This is Xchat's first red flag. Signals store the user's private key on the device, not on the server. The way and where private keys are stored on the X server are also important.

Security researcher Matthew Garrett, who released a blog post about XChat in June when X announced its new service and began to slowly unfold, wrote that if a company does not use a hardware security module or HSM to store keys, it can tamper with keys. HSMS is a server specially made to make it more difficult for the company that owns its own data to access internal data.

The X engineer said in a June post that the company uses HSMS, but neither he nor the company provided any previous evidence. “Until that's done, this is the territory of 'trust us, fellows',” Garrett told TechCrunch.

The second red flag that X admits on its XCHAT support page is that the current implementation of the service could allow “malicious insiders or X itself” to compromise encrypted conversations.

This is what is technically called an “intermediate enemy” or AITM attack. This will make the overall point of an end-to-end encrypted messaging platform MOOT.

Garrett ran the AITM attack, saying that X “gives a public key every time you communicate with them, so even if they implement this properly, you can't prove they haven't created a new key.”

Another danger flag is that at this point, none of the Xchat implementations are open source. This is openly and in great detail, unlike Signal's. X said that through a technical whitepaper later this year, he aims to “make implementations open source and provide a detailed explanation of encryption technology.”

Finally, X does not provide “Perfect Forward Secrecy.” This is an encryption mechanism in which all new messages are encrypted with a different key. This means that if an attacker compromises a user's private key, they can decipher the last message, not all previous messages. The company itself acknowledges this drawback.

As a result, Garrett doesn't think Xchat needs users to trust it yet.

“If everyone involved is completely reliable, X implementation is technically worse than signal,” Garrett told TechCrunch. “And even if they were completely trusted at first, they could stop being trusted and compromise on trust in multiple ways… If they can't be trusted or incompetent during the first implementation, it's impossible to demonstrate that there is absolutely no security.”

Garrett is not the only expert to raise concerns. Matthew Green, a cryptographic expert who teaches at Johns Hopkins University, agrees.

“At this point, I don't trust DMS at the moment, until I get a full audit from a reputable person,” Green told TechCrunch. (XChat is another feature that lives on using legacy direct messages, at least for now.)

X did not respond to some questions sent to your press email address.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Venezuelan president believes that American spies cannot hack Huawei's phones

September 3, 2025

ICE revitalizes its contract with Spyware Maker Paragon

September 2, 2025

WhatsApp fixes a “zero click” bug used to hack Apple users with spyware

August 29, 2025

According to Transunion, hackers say they stole the personal information of 4.4 million customers

August 28, 2025

The FBI says that China's salt typhoon has hacked at least 200 US companies

August 27, 2025

US sanctions fraud network used by North Korea's “remote IT workers” to steal money for work

August 27, 2025

Leave A Reply Cancel Reply

Top Reviews
Editors Picks

7 days left: Founders and VCs save over $300 on all stage passes

March 24, 2025

AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

March 24, 2025

20 Hottest Open Source Startups of 2024

March 22, 2025

Andrill may build a weapons factory in the UK

March 21, 2025
About Us
About Us

Welcome to Tech Brunch, your go-to destination for cutting-edge insights, news, and analysis in the fields of Artificial Intelligence (AI), Cryptocurrency, Technology, and Startups. At Tech Brunch, we are passionate about exploring the latest trends, innovations, and developments shaping the future of these dynamic industries.

Our Picks

Pulley, 645 Venture, and Epigram Legal disrupt the 2025 agenda

September 5, 2025

X offers me an end-to-end encrypted chat – you probably shouldn't trust it yet

September 5, 2025

Learn to create communities and businesses that continue in 2025

September 5, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

© 2025 TechBrunch. Designed by TechBrunch.
  • Home
  • About Tech Brunch
  • Advertise with Tech Brunch
  • Contact us
  • DMCA Notice
  • Privacy Policy
  • Terms of Use

Type above and press Enter to search. Press Esc to cancel.