

"This may all be just one big prank, with me as the victim."
#CRYPTOCAT SECURITY SOFTWARE#
After returning from a trip to New York City, Kobeissi says he found his SFTP client attempting to make a number of connections on its own, including hostnames that "appear to belong to the CSIS" and a software company that provides IT services for the Canadian court system. Kobeissi says the discovery of alleged government tampering came after a couple of odd email exchanges in January with two individuals going by "PG" and "GB." At first they seemed to be soliciting his services for a website project, but when he declined "PG" allegedly claimed to be a Juror and a former correspondent for the French newspaper Le Monde with ties to the CSIS. In light of my compromise, we have migrated Cryptocat’s network to a Swedish nuclear bunker, reset all keys, etc.: /2013/02/crypto… While Kobeissi pokes fun at the move - he writes that "having our network inside a Cold War nuclear bunker in Sweden would satisfy our need for the world to be as cartoon-like as possible" - he's not laughing about the alleged intrusion from government intelligence agents. Nadim Kobeissi, developer of the secure chat client Cryptocat, claims that agents from the Canadian Security Intelligence Service may have installed a backdoor on his computer to monitor his activities, prompting him to migrate the service's network and reset its security keys.
