From the beginning, LibraryH3lp has been designed as a privacy-first application. Guests chat anonymously as there is no requirement or option for guests to enter any sort of identifying information such as email address or name to begin a chat. As a customer, you are the main custodian of your subscription data and control your internal users, queues, and transcript retention (which is an opt-in feature). In this vein, we are excited to offer a new optional feature for web-based chats -- end-to-end encryption.
Released as follows:
- Canada: May 22, 2021
- Europe: May 29, 2021
- Singapore: May 29, 2021
- Main (North America): June 20, 2021
What is end-to-end encryption (E2EE) and off the record messaging (OTR)?
End-to-end encryption (E2EE) means that only the two parties (ends) participating in a chat can read the messages. No one else (including LibraryH3lp support personnel) can read the messages because the messages are encrypted. The specific cryptographic protocol used to encrypt chat messages is Off the Record Messaging (OTR).
As a further proof against man-in-the-middle (MITM) eavesdropping, operators answering chats in the webclient for staffing can optionally provide the private key from a Digital Signature Algorithm (DSA) key pair so that the guest's chat box (which has the matching public key fingerprint) can confirm that the answering operator is authorized to communicate with the guest.
Note: E2EE/OTR is not available nor planned for SMS (texting) chats.
Wait. Aren't chats encrypted by default?
Yes. Even without setting up E2EE, guest chat boxes use HTTPS by default and the operator's webclient for staffing always uses HTTPS. With HTTPS, chat messages are encrypted in transit over the network. However unlike with E2EE chats, these chat transcripts can also be read by authenticated users that have appropriate permissions in Chat History while a chat is active, and also after a chat has ended if transcript storage has been enabled. Chat transcript retention provides the ability for later access and can be useful for things like training, data assessment/analysis, and personnel review.
Even though this OTR chat is active, its transcript cannot be seen in Chat History. |
If my chats are already encrypted, why would I want to set up E2EE/OTR?
Actually we anticipate that most customers will not set up E2EE/OTR, since messages are encrypted in transit via HTTPS and the ability for later transcript review is an important part of quality assurance, assessment, and training for many organizations.
However customers in countries with very strong data privacy regulations or any customer with stringent privacy requirements might be interested in E2EE. For example, if E2EE is configured, then there is no way for LibraryH3lp support staff to access chat transcripts, and that can be an important feature.
No comments:
Post a Comment