DarkMatter is a name that conjures up all sorts of … darkness, even when you don’t know who, or what, is behind it.
The truth is, DarkMatter is two very different beasts in one.
On the surface, it is a certificate authority--a cryptographic entity that issues digital certificates that certify the ownership of a public key. In other words, it verifies the ownership of a domain and validates that identity.
It’s a powerful authority, but Firefox thinks it’s too much power for a company that is also believed to be involved in high-level espionage.
DarkMatter has been waiting for months for Firefox to whitelist it, but in a July 9th discussion group post, Mozilla’s certification authority manager Wayne Thayer said it was his company’s top priority to protect users and DarkMatter posed “a significant risk”. While the name “DarkMatter” doesn’t help, neither does the reputation.
The UAE company has been accused of developing malware and spyware for surveillance operations. It’s also been singled out for targeting dissidents, journalists and a lineup of royal rivals. And if that wasn’t clear, it’s been accused of state-sponsored hacking--all of which the company denies.
According to a Reuters report from late January, not only DarkMatter used the “Karma” spying tool to hack into the iPhones of activists, diplomats and rival foreign leaders, but they also did it with help from former U.S. government intelligence operatives now on the UAE payroll. Reuters got five of those former operatives to spill the beans on what was dubbed “Project Raven”.
The underlying message, then, is that DarkMatter is believed to be a contractor for the UAE intelligence services.
And Karma isn’t just another hacking tool--it is powerful enough to tap into hundreds of iPhones at once, and it’s the height of cyberwarfare tools right now. Few countries would be capable of developing it.
With this in mind, Mozilla’s view seems to be that DarkMatter is both a protector of internet security, and one of its biggest enemies.
What DarkMatter was asking from Mozilla was this: Formally trust our root certificates in the Firefox certificate store, where trusted certificate authorities are approved to issue HTTPS certificates.
The risk, according to TechCrunch, is that a “malicious certificate authority could allow the interception of encrypted internet traffic by faking or impersonating websites”. And that would, indeed, be a “dark matter”.
Certificate authorities are at the top of the hierarchy of trust in the digital world. They are there to secure the web, email and other connections that allow commerce, government and every single online community to function securely, and without external infiltration.
As a root authority, DarkMatter, through Mozilla, could issue invalid certificates for domains they don’t manage. That would allow attackers to slip in and steal data and intercept encrypted traffic. A root authority, put in another way, is the perfect espionage tool.
It’s a vastly powerful positioning, and--largely thanks to Reuters--Mozilla won’t be letting a questionable power broker in through the front door.
By Michael Kern for Safehaven.com
More Top Reads From Safehaven.com: