{"id":11118,"date":"2022-05-31T08:14:36","date_gmt":"2022-05-31T06:14:36","guid":{"rendered":"https:\/\/verji.no\/overview-of-technology-and-security-in-verji"},"modified":"2024-06-20T18:09:37","modified_gmt":"2024-06-20T16:09:37","slug":"overview-of-technology-and-security-in-verji","status":"publish","type":"page","link":"https:\/\/verji.no\/en\/overview-of-technology-and-security-in-verji","title":{"rendered":"Overview of technology and security in Verji"},"content":{"rendered":"<section class=\"l-section wpb_row us_custom_fdcab3db height_medium\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"ult-spacer spacer-69de2582cfa5d\" data-id=\"69de2582cfa5d\" data-height=\"73\" data-height-mobile=\"30\" data-height-tab=\"\" data-height-tab-portrait=\"\" data-height-mobile-landscape=\"30\" style=\"clear:both;display:block;\"><\/div><div class=\"g-cols wpb_row hide_on_mobiles via_flex valign_top type_default stacking_default\" id=\"desktop-crumbs\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-hwrapper dots2 valign_middle wrap align_none\" style=\"--hwrapper-gap:5px\"><nav class=\"g-breadcrumbs us_custom_444cf2fa has_text_color separator_custom align_none\" itemscope itemtype=\"http:\/\/schema.org\/BreadcrumbList\"><div class=\"g-breadcrumbs-item\" itemscope itemprop=\"itemListElement\" itemtype=\"http:\/\/schema.org\/ListItem\"><a itemprop=\"item\" href=\"https:\/\/verji.no\/en\/\"><span itemprop=\"name\">Front page<\/span><\/a><meta itemprop=\"position\" content=\"1\"\/><\/div><div class=\"g-breadcrumbs-separator\">\/<\/div><div class=\"g-breadcrumbs-item\">Pages<\/div><\/nav><div class=\"w-image us_custom_f45ae982 dots-flex align_none\"><div class=\"w-image-h\"><img decoding=\"async\" width=\"5\" height=\"17\" src=\"https:\/\/verji.no\/wp-content\/uploads\/2021\/10\/column-5x17.png\" class=\"attachment-us_5_17 size-us_5_17\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/verji.no\/wp-content\/uploads\/2021\/10\/column-5x17.png 5w, https:\/\/verji.no\/wp-content\/uploads\/2021\/10\/column-29x100.png 29w, https:\/\/verji.no\/wp-content\/uploads\/2021\/10\/column-2x6.png 2w, https:\/\/verji.no\/wp-content\/uploads\/2021\/10\/column-41x140.png 41w, https:\/\/verji.no\/wp-content\/uploads\/2021\/10\/column.png 50w\" sizes=\"auto, (max-width: 5px) 100vw, 5px\" \/><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"g-cols wpb_row hide_on_default hide_on_laptops hide_on_tablets via_flex valign_top type_default stacking_default\" id=\"mobile-crumbs\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-hwrapper dots2 valign_middle wrap align_none\" style=\"--hwrapper-gap:5px\"><nav class=\"g-breadcrumbs us_custom_444cf2fa has_text_color separator_custom align_none\" itemscope itemtype=\"http:\/\/schema.org\/BreadcrumbList\"><div class=\"g-breadcrumbs-item\" itemscope itemprop=\"itemListElement\" itemtype=\"http:\/\/schema.org\/ListItem\"><a itemprop=\"item\" href=\"https:\/\/verji.no\/en\/\"><span itemprop=\"name\">Front page<\/span><\/a><meta itemprop=\"position\" content=\"1\"\/><\/div><div class=\"g-breadcrumbs-separator\">\/<\/div><div class=\"g-breadcrumbs-item\">Pages<\/div><\/nav><div class=\"w-image us_custom_f45ae982 dots-flex align_none\"><div class=\"w-image-h\"><img decoding=\"async\" width=\"5\" height=\"17\" src=\"https:\/\/verji.no\/wp-content\/uploads\/2021\/10\/column-5x17.png\" class=\"attachment-us_5_17 size-us_5_17\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/verji.no\/wp-content\/uploads\/2021\/10\/column-5x17.png 5w, https:\/\/verji.no\/wp-content\/uploads\/2021\/10\/column-29x100.png 29w, https:\/\/verji.no\/wp-content\/uploads\/2021\/10\/column-2x6.png 2w, https:\/\/verji.no\/wp-content\/uploads\/2021\/10\/column-41x140.png 41w, https:\/\/verji.no\/wp-content\/uploads\/2021\/10\/column.png 50w\" sizes=\"auto, (max-width: 5px) 100vw, 5px\" \/><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-vwrapper us_custom_6e74c4b0 align_none valign_top\" style=\"--vwrapper-gap:\"><div class=\"ult-spacer spacer-69de2582d1436\" data-id=\"69de2582d1436\" data-height=\"40\" data-height-mobile=\"20\" data-height-tab=\"\" data-height-tab-portrait=\"\" data-height-mobile-landscape=\"20\" style=\"clear:both;display:block;\"><\/div><h1 class=\"w-post-elm post_title us_custom_129ccc75 entry-title color_link_inherit\">Overview of technology and security in Verji<\/h1><div class=\"ult-spacer spacer-69de2582d152d\" data-id=\"69de2582d152d\" data-height=\"30\" data-height-mobile=\"0\" data-height-tab=\"\" data-height-tab-portrait=\"\" data-height-mobile-landscape=\"\" style=\"clear:both;display:block;\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row us_custom_5cd26a65 height_medium\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-7 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"ult-spacer spacer-69de2582d1edd\" data-id=\"69de2582d1edd\" data-height=\"20\" data-height-mobile=\"20\" data-height-tab=\"20\" data-height-tab-portrait=\"\" data-height-mobile-landscape=\"\" style=\"clear:both;display:block;\"><\/div><div class=\"wpb_text_column us_custom_100d89a9\"><div class=\"wpb_wrapper\"><h2>Fundamentals<\/h2>\n<p>In Verji, all data is protected by encryption, both in-flight, and at rest. Additionally messages, files and images, communicated in Verji rooms are protected by an additional layer of end-to-end-encryption (E2EE).<\/p>\n<h3>Use of standards<\/h3>\n<p>Adversaries and attackers have access to increasingly powerful tools and methods, so while <strong>expertise and knowledge<\/strong> used to be crucial requirements for effective attacks, we are now getting into a situation where <strong>motivation<\/strong>, is the only requirement to launch advanced attacks.<\/p>\n<p>Additionally, implementing secure technology is notoriously hard to do.<\/p>\n<p>With this as a backdrop, Verji Tech avoids inventing new crypto, and new protocols, and instead relies on industry standards, best practise, and battle tested frameworks and implementations wherever possible.<\/p>\n<p>The core of Verji is based on Matrix, which is an open standard and protocol, with a vibrant community, and a healthy and transparent governance model (<a href=\"https:\/\/matrix.org\/about\/\">https:\/\/matrix.org\/about\/<\/a>)<\/p>\n<p>With this strategy Verji is in good company, as numerous other security-conscious organizations have chosen to build their solutions on the same core technologies, e.g.<\/p>\n<ul>\n<li>German Armed Forces:<a href=\"https:\/\/element.io\/blog\/bundesmessenger-is-a-milestone-in-germanys-ground-breaking-vision\/\">https:\/\/element.io\/blog\/bundesmessenger-is-a-milestone-in-germanys-ground-breaking-vision\/<\/a><\/li>\n<li>Gematik (German Healthcare):<a href=\"https:\/\/element.io\/matrix-in-germany\/projects\/ti-messenger\">https:\/\/element.io\/matrix-in-germany\/projects\/ti-messenger<\/a><\/li>\n<li>French Government: <a href=\"https:\/\/element.io\/case-studies\/tchap\">https:\/\/element.io\/case-studies\/tchap<\/a><\/li>\n<li>Sweden: <a href=\"https:\/\/element.io\/blog\/dsam-och-esam-forordar-matrix-for-saker-och-federerad-kommunikation-inom-sveriges-offentliga-sektor\/\">https:\/\/element.io\/blog\/dsam-och-esam-forordar-matrix-for-saker-och-federerad-kommunikation-inom-sveriges-offentliga-sektor\/<\/a><\/li>\n<li>Mozilla: <a href=\"https:\/\/matrix.org\/blog\/2019\/12\/19\/welcoming-mozilla-to-matrix\/\">https:\/\/matrix.org\/blog\/2019\/12\/19\/welcoming-mozilla-to-matrix\/<\/a><\/li>\n<\/ul>\n<h2>Messaging<\/h2>\n<p>Verji employs battle tested and industry recognized methods for message encryption. Verji employ Elliptic Curve Cryptopgraphy (ECC) along with Advanced Encryption Standard (AES), to protect content such as<br \/>\nmessages, files and images. To support asynchronous communication, where all parties may not be online at the same time, we use a Double Ratched algorithm (<a href=\"https:\/\/en.m.wikipedia.org\/wiki\/Double_Ratchet_Algorithm\">https:\/\/en.m.wikipedia.org\/wiki\/Double_Ratchet_Algorithm.<\/a>)<\/p>\n<p>Specifically, Verji uses an implementation of the Double Ratchet algorithm called Olm. To allow effective communications also in group conversations with many participants, a group ratchet called Megolm is used. For details about Olm and Megolm, please see:<\/p>\n<ul>\n<li><a href=\"https:\/\/gitlab.matrix.org\/matrix-org\/olm\/-\/blob\/master\/docs\/olm.md\">https:\/\/gitlab.matrix.org\/matrix-org\/olm\/-\/blob\/master\/docs\/olm.md<\/a><\/li>\n<li><a href=\"https:\/\/gitlab.matrix.org\/matrix-org\/olm\/blob\/master\/docs\/megolm.md\">https:\/\/gitlab.matrix.org\/matrix-org\/olm\/blob\/master\/docs\/megolm.md<\/a><\/li>\n<\/ul>\n<p>A third party, independent, analysis and audit of Olm 1.3.0 can be found here:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.nccgroup.com\/globalassets\/our-research\/us\/public-rapporter\/2016\/november\/ncc_group_olm_cryptogrpahic_review_2016_11_01.pdf\">https:\/\/www.nccgroup.com\/globalassets\/our-research\/us\/public-rapporter\/2016\/november\/ncc_group_olm_cryptogrpahic_review_2016_11_01.pdf<\/a><\/li>\n<\/ul>\n<p>The vulnerabilities covered in the report were addressed and patched in subsequent release of Olm (v2.0.0 fra 25\/10-2016).<\/p>\n<p>A more recent, Rust based, implementation of the Olm and Megolm protocols (called Vodozemac) is developed and maintained here:<\/p>\n<ul>\n<li><a href=\"https:\/\/github.com\/matrix-org\/vodozemac\">https:\/\/github.com\/matrix-org\/vodozemac<\/a><\/li>\n<\/ul>\n<p>And a third party analysis and audit of the implemention can be found here:<\/p>\n<ul>\n<li><a href=\"https:\/\/leastauthority.com\/static\/publications\/LeastAuthority-Matrix_vodozemac_Final_Audit_Report.pdf\">https:\/\/leastauthority.com\/static\/publications\/LeastAuthority-Matrix_vodozemac_Final_Audit_Report.pdf<\/a><\/li>\n<\/ul>\n<p>To exchange messages, and negotiate keys, Verji use the open, battle tested and well documented Matrix protocol <a href=\"https:\/\/en.wikipedia.org\/wiki\/Matrix_(protocol)\">https:\/\/en.wikipedia.org\/wiki\/Matrix_(protocol)<\/a><\/p>\n<p>An analysis of the key exchange protocol in matrix can be found here:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.cs.ru.nl\/bachelors-theses\/2020\/Floris_Hendriks___4749294___Analysis_of_key_management_in_Matrix.pdf\">https:\/\/www.cs.ru.nl\/bachelors-theses\/2020\/Floris_Hendriks___4749294___Analysis_of_key_management_in_Matrix.pdf<\/a><\/li>\n<\/ul>\n<h2>Authentication and authorization<\/h2>\n<h3>Authentication<\/h3>\n<p>To authenticate users Verji use the industry standard OpenIdConnect protocol, which is based on the OAuth 2.0 framework. The implementation uses the mature and OpenId certified, Duende framework, which is also featured in the official Microsoft Identity documentation:<\/p>\n<ul>\n<li><a href=\"https:\/\/duendesoftware.com\/\">https:\/\/duendesoftware.com\/<\/a><\/li>\n<li><a href=\"https:\/\/learn.microsoft.com\/en-us\/aspnet\/core\/security\/authentication\/identity?view=aspnetcore-8.0&amp;tabs=visual-studio\">https:\/\/learn.microsoft.com\/en-us\/aspnet\/core\/security\/authentication\/identity?view=aspnetcore-8.0&amp;tabs=visual-studio<\/a><\/li>\n<\/ul>\n<h3>Authorization<\/h3>\n<p>Fine grained access control is implemented in Verji using the popular Casbin framework.<\/p>\n<ul>\n<li><a href=\"https:\/\/casbin.org\/\">https:\/\/casbin.org\/<\/a><\/li>\n<\/ul>\n<h2>Summary<\/h2>\n<p>To summarize; Verji uses well established, well tested, industry standard algorithms, protocols and frameworks to secure the user&#8217;s messages and accounts.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-5 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"Front page\/PagesFront page\/PagesOverview of technology and security in VerjiFundamentals In Verji, all data is protected by encryption, both in-flight, and at rest. Additionally messages, files and images, communicated in Verji rooms are protected by an additional layer of end-to-end-encryption (E2EE). Use of standards Adversaries and attackers have access to increasingly powerful tools and methods, so...","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"content-type":"","footnotes":""},"class_list":["post-11118","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Overview of technology and security in Verji<\/title>\n<meta name=\"description\" content=\"Verji uses a well-tested and widely recognized method of encryption. Here you can read more about the methods used.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/verji.no\/en\/overview-of-technology-and-security-in-verji\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Overview of technology and security in Verji\" \/>\n<meta property=\"og:description\" content=\"Verji uses a well-tested and widely recognized method of encryption. Here you can read more about the methods used.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/verji.no\/en\/overview-of-technology-and-security-in-verji\" \/>\n<meta property=\"og:site_name\" content=\"Verji\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-20T16:09:37+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/verji.no\/en\/overview-of-technology-and-security-in-verji\",\"url\":\"https:\/\/verji.no\/en\/overview-of-technology-and-security-in-verji\",\"name\":\"Overview of technology and security in Verji\",\"isPartOf\":{\"@id\":\"https:\/\/verji.no\/en#website\"},\"datePublished\":\"2022-05-31T06:14:36+00:00\",\"dateModified\":\"2024-06-20T16:09:37+00:00\",\"description\":\"Verji uses a well-tested and widely recognized method of encryption. Here you can read more about the methods used.\",\"breadcrumb\":{\"@id\":\"https:\/\/verji.no\/en\/overview-of-technology-and-security-in-verji#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/verji.no\/en\/overview-of-technology-and-security-in-verji\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/verji.no\/en\/overview-of-technology-and-security-in-verji#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Hjem\",\"item\":\"https:\/\/verji.no\/en\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Overview of technology and security in Verji\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/verji.no\/en#website\",\"url\":\"https:\/\/verji.no\/en\",\"name\":\"Verji\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/verji.no\/en?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Overview of technology and security in Verji","description":"Verji uses a well-tested and widely recognized method of encryption. Here you can read more about the methods used.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/verji.no\/en\/overview-of-technology-and-security-in-verji","og_locale":"en_US","og_type":"article","og_title":"Overview of technology and security in Verji","og_description":"Verji uses a well-tested and widely recognized method of encryption. Here you can read more about the methods used.","og_url":"https:\/\/verji.no\/en\/overview-of-technology-and-security-in-verji","og_site_name":"Verji","article_modified_time":"2024-06-20T16:09:37+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/verji.no\/en\/overview-of-technology-and-security-in-verji","url":"https:\/\/verji.no\/en\/overview-of-technology-and-security-in-verji","name":"Overview of technology and security in Verji","isPartOf":{"@id":"https:\/\/verji.no\/en#website"},"datePublished":"2022-05-31T06:14:36+00:00","dateModified":"2024-06-20T16:09:37+00:00","description":"Verji uses a well-tested and widely recognized method of encryption. Here you can read more about the methods used.","breadcrumb":{"@id":"https:\/\/verji.no\/en\/overview-of-technology-and-security-in-verji#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/verji.no\/en\/overview-of-technology-and-security-in-verji"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/verji.no\/en\/overview-of-technology-and-security-in-verji#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Hjem","item":"https:\/\/verji.no\/en"},{"@type":"ListItem","position":2,"name":"Overview of technology and security in Verji"}]},{"@type":"WebSite","@id":"https:\/\/verji.no\/en#website","url":"https:\/\/verji.no\/en","name":"Verji","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/verji.no\/en?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/verji.no\/en\/wp-json\/wp\/v2\/pages\/11118","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/verji.no\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/verji.no\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/verji.no\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/verji.no\/en\/wp-json\/wp\/v2\/comments?post=11118"}],"version-history":[{"count":5,"href":"https:\/\/verji.no\/en\/wp-json\/wp\/v2\/pages\/11118\/revisions"}],"predecessor-version":[{"id":11123,"href":"https:\/\/verji.no\/en\/wp-json\/wp\/v2\/pages\/11118\/revisions\/11123"}],"wp:attachment":[{"href":"https:\/\/verji.no\/en\/wp-json\/wp\/v2\/media?parent=11118"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}