How safe is a Twitter replacement with Mastodon? Let’s count the roads

First design

Site Theme

While Elon Musk’s critics flee Twitter, Mastodon turns out to be the ultimate non-unusual replacement. Over the past month, the number of monthly active users on Mastodon has more than tripled from about 1 million to 3. 5 million, while the total number of users has increased from around 6. 5 million to 8. 7 million.

This really extensive construction raises vital questions about the security of this new platform, and for a smart reason. Unlike Twitter’s centralized style and virtually both social media platforms, Mastodon relies on a federated style of independent servers, called instances. In this sense, it is more like email or Internet Relay Chat (IRC), where security depends on the skill and attention of the administrator who set it up and manages the individual server.

Last month, the number of times increased from about 11,000 to more than 17,000. The other people who manage those times are volunteers who may not be familiar with the nuances of safety. The difficulty of setting up and maintaining times leaves plenty of room for errors that can divulge user passwords, email addresses, and IP addresses with the threat of being revealed (more on that later). Twitter’s security left a lot to be desired, but at least it had a committed experience with counterfeit security.

“Honestly, I think that’s the biggest security fear in the space,” said Mike Lendvay, a qualified data security professional and a qualified cloud security professional who also manages the Mastodon friendsofdesoto social instance. of the servers disappear very quickly, and the skill point of the other people who manage them will be very uneven. “

Another fear is the software that powers the Mastodon platform. Never undergoing a formal security audit, the European Commission sponsored a bug bounty program that resulted in fixes for 35 valid bug submissions. Earlier this month, a researcher discovered an incorrect configuration in several instances that allowed uploading and deleting all files stored on the server and replacing each user’s profile picture.

The absence of audits and years of physically powerful third-party security testing means that serious security weaknesses are almost present.

At this point, an independent researcher found a server this month that had effectively extracted the information of more than 150,000 users from a misconfigured server. Luckily, the information was limited to account names, demo names, profile pictures, number of followers, and the latest prestige update. A third vulnerability discovered this month in an example allowed users to search for borrowed passwords in plain text by injecting specially crafted HTML code into the site.

Of course, all platforms have those kinds of vulnerabilities, and Mastodon’s developers and example directors were quick to patch them once they were reported. But other platforms have groups of security engineers, researchers and compliance specialists who review recently patched vulnerabilities to make sure their platform is running updated components. Mastodon’s federated design reflects this. Expecting volunteers to act on the same scale as a centralized platform is unrealistic, to say the least.

But things may just happen if one of those apps is hit by something serious like HeartBleed, the 2014 bug in the open-source OpenSSL app that caused all sorts of sensitive knowledge to leak from banking websites and other high-value passes.

In addition, the Mastodon software does not have an automatic update service or availability of updates.

“You want to personally verify GitHub versions,” Lendvay said. I try to do this every week. But for many, I think they would listen through Vine. I’ve noticed disparate versions work, so who knows what consistency will be.

Mastodon, or at least the times it hosts well-known or influential users, is also very likely to be much more vulnerable to distributed denial of service (DDo) attacks, which take sites offline by bombing servers with more traffic or commands than they can handle. Centralized platforms with deep wallet DDoS mitigation servers as the base cost. Agencies run by volunteers probably don’t have the same resources.

In addition to knowledge theft, hackers may also be tempted to hack into the accounts of other influencers or take administrative roles. In any case, the hacker can simply pose as influential users.

“I would bet cash that there are vulnerabilities in the ActivityPub protocol that will allow a fake beep attributable to a known group to be spread,” one user said. “Or some other protocol problem will be encountered. “

Finally, Mastodon is more vulnerable to harassment and misinformation campaigns, assuming they take positions on a large scale.

“As far as private security goes, there are a lot of protections against harassment,” said Jon Pincus of Nexus of Privacy. “Many times they are not well moderated (including mastodon. social, which [Mastodon creator] Eugen [Rochko] executes). Even well-tempered times can be overcome through the attacks of our minds.

Join the Ars Orbital Transmission email to get weekly updates to your inbox.

Leave a Comment

Your email address will not be published. Required fields are marked *