Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Privacy

Dispel Launches Security-focused Video Conferencing Platform

Secure Video Conferencing Solution Protects Content and Metadata in Voice and Video Communication

Secure Video Conferencing Solution Protects Content and Metadata in Voice and Video Communication

The need for global secure voice and video communication is constantly growing. Whether it’s for corporate intellectual property (IP) being shared between dispersed research centers or legal offices discussing mergers and acquisitions, both content and metadata needs to be protected from surveillance.

While the content of video conference sessions is relatively easy to protect with encryption, the metadata remains visible to hackers, governments and agencies.

Metadata (source, destination, timing, location etcetera), and especially patterns of metadata, can provide strong inferences over content.

Dispel, a U.S. company formed in 2014 and based in New York, has launched what it calls ‘the first commercially available counter-reconnaissance voice and video system’ that ‘renders live-stream communications impenetrable to metadata-driven surveillance and hacking.’

Dispel, the company told SecurityWeek, takes a new approach to security. Traditionally, companies defend their networks by building bigger and stronger walls; but this approach leaves attackers with a huge advantage: they have time to locate unknown weaknesses. Dispel’s approach is to hide the network and make it transient

“Enterprises and professionals,” says Scott Crawford, research director of information security at 451 Research, “particularly those stationed in insecure regions and locales, require a secure communications platform that can be trusted, and free-from-surveillance voice and video communication tools for their business needs.”

Metadata is the weak point. Many countries allow their agencies unrestricted access to communications metadata. “Parallel with the increased use of encryption, big data analysis and behavioral inference have become the techniques of choice for technically sophisticated parties attempting to decipher what companies, governments, and persons of interest are communicating, as well as where their assets are located,” comments Ethan Schmertzler, CEO of Dispel.

Advertisement. Scroll to continue reading.

Dispel promises complete security of communication by first providing the videoconferencing software, and then protecting the content and hiding or neutralizing the metadata. The content of the communication is protected by a combination of SHA-256 with a 4096-bit key, and 2048-bit RSA key. The metadata is hidden, or dispersed, with a scattergrid approach similar but superior to that used by TOR. Very simply, Dispel bounces the communications between randomly raised VM machines in and between different cloud providers. These are currently Amazon, Azure (soon), DigitalOcean, Rackspace, SoftLayer and Vultr.

However, the user is able to control that data through the software console, thus never losing its chain of custody. The entire Dispel infrastructure remains under the licensed control of the user, and regulatory compliance can be controlled through geographic specifications. For example, US defense companies could insist that the communications remain within the US; European health or pharmaceutical companies could insist that data remains within the European Union. The user is able to specify the use of the cloud providers and which of their data centers to employ, or leave the system to randomly choose the route from location to destination.

The process leaves no forensic footprint. Firstly, the network (or route) cannot be predicted by an adversary, and secondly it is automatically dismantled on completion. The resources used are subsequently re-provisioned by the cloud provider to other unassociated cloud users.

Two of the major weaknesses of the TOR approach to security and anonymity are also eliminated. Monitoring and timing entry points and exit points is impossible — this is just like any other encrypted traffic entering and leaving a general purpose cloud provider. Furthermore, the inherently low speeds of TOR are replaced by enterprise quality high speed cloud communication.

Dispel requires no local agent. It is operated entirely through the browser and is currently supported by Chrome, Firefox, Vivaldi, and Opera on macOS, Windows, Linux, and Android. This makes it particularly easy to use, and suitable for anything from high-powered financial circles to a publisher communicating with a single journalist in a sensitive region.

Written By

Kevin Townsend is a Senior Contributor at SecurityWeek. He has been writing about high tech issues since before the birth of Microsoft. For the last 15 years he has specialized in information security; and has had many thousands of articles published in dozens of different magazines – from The Times and the Financial Times to current and long-gone computer magazines.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Kim Larsen is new Chief Information Security Officer at Keepit

Professional services company Slalom has appointed Christopher Burger as its first CISO.

Allied Universal announced that Deanna Steele has joined the company as CIO for North America.

More People On The Move

Expert Insights

Related Content

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.

Cybersecurity Funding

Los Gatos, Calif-based data protection and privacy firm Titaniam has raised $6 million seed funding from Refinery Ventures, with participation from Fusion Fund, Shasta...

Privacy

Many in the United States see TikTok, the highly popular video-sharing app owned by Beijing-based ByteDance, as a threat to national security.The following is...

Privacy

Employees of Chinese tech giant ByteDance improperly accessed data from social media platform TikTok to track journalists in a bid to identify the source...

Application Security

Open banking can be described as a perfect storm for cybersecurity. At one end, small startups with financial acumen but little or no security...

Government

The proposed UK Online Safety Bill is the enactment of two long held government desires: the removal of harmful internet content, and visibility into...

Mobile & Wireless

As smartphone manufacturers are improving the ear speakers in their devices, it can become easier for malicious actors to leverage a particular side-channel for...

Cloud Security

AWS has announced that server-side encryption (SSE-S3) is now enabled by default for all Simple Storage Service (S3) buckets.