Settings

Theme

Zoom’s encryption has links to China, researchers discover

theintercept.com

275 points by ddebernardy 6 years ago · 136 comments

Reader

dang 6 years ago

It seems like the root node of this article graph is https://citizenlab.ca/2020/04/move-fast-roll-your-own-crypto..., which is being discussed here: https://news.ycombinator.com/item?id=22768494

Matthew Green's article is being discussed here: https://news.ycombinator.com/item?id=22771193

meowface 6 years ago

I'd recommend reading the original Citizen Lab article as well, which discusses the flaws more specifically. This Intercept article is good, but seems to be aimed at more of a general, less-technical audience.

https://citizenlab.ca/2020/04/move-fast-roll-your-own-crypto...

At the very least, they are validating TLS certificates. (Which I know is the true bare minimum requirement of TLS, but "goto fail" and all...)

>We set up mitmproxy to intercept the TLS traffic and configured the Zoom Linux client to route its TLS traffic through mitmproxy. Fortunately, the Zoom client did appear to warn us that the fake TLS certificates generated by mitmproxy were untrusted.

  • dang 6 years ago

    That article is now being discussed at https://news.ycombinator.com/item?id=22768494. Not sure whether to try to merge these threads.

  • fulafel 6 years ago

    The CL article seems to be underplaying the vulnerability of ECB, with the "not recommended" description. Any cryptographer will tell you it's downright trivially broken, with textbook practical attacks taught to undergrads.

    • cvwright 6 years ago

      Is ECB any worse than any other deterministic encryption?

      Deterministic encryption can be ok if the data that you’re encrypting is already really random (high min-entropy). Compressed audio and video streams have a decent amount of entropy. Probably not enough to satisfy a cryptographer, but it’s probably enough to make it very difficult to learn much from 128-bit AES ECB blocks.

      Note that everyone’s favorite ECB example with the picture of Tux the Linux penguin is not very realistic, because the plaintext is not compressed. If you ECB a JPEG or a PNG, you won’t see the same patterns.

      I teach the attacks on ECB in my network security class. It’s bad, but AES is not the Caesar cipher. I’m not sure “trivially broken” is quite right.

      That said, I am really curious what Zoom is actually doing here. Going to have to take a look today. My guess is that the real fail from using ECB mode is more likely to come from using it on audio/video metadata, or on other more structured parts of the protocol.

      • doomrobo 6 years ago

        All this is technically true. As long as you believe that you will never ever under any circumstance send the same video chunk twice under the same key, you get all the security guarantees of a real CPA-secure (=> non-deterministic) symmetric cipher. But 1. I don't think this is a reasonable belief, and 2. even if it is, why chance it when you can use CTR mode and a random nonce, with practically zero overhead?

        • cvwright 6 years ago

          > As long as you believe that you will never ever under any circumstance send the same video chunk twice under the same key

          Yes, that is the question here, and it's a really fascinating one. How often do you send two identical 128-bit chunks in practice? How much does it depend on the quality of your webcam and your lighting? If the video is grainy and splotchy in the background, you're getting a lot of randomness in your data. How much does that help? Any at all? Or are you still totally screwed?

          > even if it is, why chance it when you can use CTR mode and a random nonce, with practically zero overhead?

          1000 times this. Crypto code should be like the safety components in a car or an airplane. You wouldn't buy a car with seatbelts or brakes that work 90% or even 95% of the time. In the same way, you shouldn't write network code that probably doesn't let an adversary figure out everything you're sending.

      • prophesi 6 years ago

        > Is ECB any worse than any other deterministic encryption?

        Yes, it's objectively worse than literally any other AES mode. You wouldn't need to depend on compression to protect your data.

        • cvwright 6 years ago

          Note that I was asking specifically about deterministic modes. Those include SIV mode [1] but not the more common CBC, CTR, etc.

          Any deterministic encryption relies on entropy of the plaintext for security [2]. This is not unique to ECB.

          My objection was to the hyperbolic phrase "trivially broken." SIV mode is deterministic, but nobody who understands what it does would call it "trivially broken."

          And I'm definitely not saying that anyone should use ECB. Just that in this case, the vulnerability may not live up to the hype.

          By all means, go ahead bashing on Zoom. It's the cool thing to do these days, and clearly they've done enough to deserve most of it.

          [1] https://web.cs.ucdavis.edu/~rogaway/papers/siv.pdf

          [2] https://eprint.iacr.org/2006/186

          • prophesi 6 years ago

            I'm personally more upset that they're advertising 256bit AES yet using 128bit AES. Sure, 128bit is still fine to use today, but it's still false advertising. They're already falsely claiming end-to-end encryption. It doesn't help that they're using the weakest mode of AES on top of all of this.

            If Zoom had a security audit, the auditors would quickly suggest using either some sort of ECB-based algorithm that uses an SIV, or just AES-CTR. I'm guessing they went with ECB due to its parallelization of the encryption/decryption process, which totally makes sense, except that there are much more secure algorithms out there.

            • cvwright 6 years ago

              Yeah you have to wonder: Did they just not know about counter mode? The implications of that are frightening.

      • lawnchair_larry 6 years ago

        This is dangerously wrong. ECB is a non-starter no matter the entropy of the plaintext. Trivially broken is accurate. I hope you are not teaching students that it is ever ok.

    • auiya 6 years ago

      An explanation w/ visuals for how/why ECB is a broken mode of operation for cryptography - https://www.crypteron.com/blog/practical-searchable-encrypti...

      • prophesi 6 years ago

        The exact same explanation + visual are already in The Intercept's article (and CitizenLab's). The rest of it is flaunting Crypteron's searchable encryption.

    • meowface 6 years ago

      If you scroll down, they go into more detail, with the classic Linux penguin example.

t0mas88 6 years ago

And another case of lying in marketing: "A security white paper from the company claims that Zoom meetings are protected using 256-bit AES keys, but the Citizen Lab researchers confirmed the keys in use are actually only 128-bit."

How do they keep doing this? Do they just put whatever sells best in the documents and implement something else? First the end2end thing, now 128 instead of 256 bits. How many more are we going to find in the coming days?

  • lozenge 6 years ago

    "We never meant to mislead people but we realise we don't use the terminology in the way it is normally understood. We added up the keys on both sides of the conversation to reach 256 bits." Is probably what they'll say

  • s_dev 6 years ago

    > Do they just put whatever sells best in the documents and implement something else?

    Yes.

    I've always expected businesses to stretch the truth with their marketing e.g. "Leading Brand of Donut in America", "Award Winning Bread", "Cheapest Gas for 50 miles"

    However Zoom are just engaging in straight up false advertising regarding security features. It's not cheeky -- it's wrong.

  • HumblyTossed 6 years ago

    > How do they keep doing this?

    Hard to say. Could be cultural where sales and engineering butt heads. Could be "sell it first, develop it later so we can beat the market" mentality.

    Either way, Zoom is going to go down as either a company that did everything right and won the market or did everything wrong and won the market. Depending on who you talk to.

  • luckylion 6 years ago

    Maybe they had GPT-2 write their marketing copy, starting with "A secure video conferencing service" and just ran with whatever that produced.

  • president 6 years ago

    > Do they just put whatever sells best in the documents and implement something else?

    I've worked 10+ years in Silicon Valley and the motto "it is better to beg forgiveness than ask for permission" really does ring true. This manifests at all levels from ICs and up the chain of leadership. People do what gets them their bonus/promotion and everything else be damned. "Acquire the customer and fix the security problem later" was the mindset here.

itcrowd 6 years ago

The story here is that Zoom uses key distribution servers located in China (in addition to several servers in the USA) and that Chinese law might be compelling Zoom to disclose the encryption keys. I think it is a valid concern, but for me it also raises the question of whether this may also be required in the US.

In addition to letting the Chinese (and possibly US) government in on the encryption keys, the encryption scheme is also badly broken (ECB mode of AES). Prof. Matthew Green has written many articles about AES and encryption more generally and I recommend his blog if you are interested (even as a lay person).

https://blog.cryptographyengineering.com/2011/12/01/how-not-...

  • kerng 6 years ago

    They are using EBC mode? I don't know of a single crypto library that would pick that as a default, so someone actually made this decision (like actively lowered encryption capability). I thought of some of the previous issues of not being too bad, but this leaves me wondering...

  • ComputerGuru 6 years ago

    Who the hell still uses ECB?

  • drevil-v2 6 years ago

    Don’t forget the straight up lying about using 256bit keys when they are actually using 128bit keys

_-___________-_ 6 years ago

Maybe I've been sensitised by all the security flaws, privacy leaks and outright lies on Zoom's part, but I'm starting to really notice how much a lot of public figures are pushing Zoom.

Does anyone else find it really weird? Late-night TV hosts, I can understand - maybe they just get paid for it, or have Zoom shares. But for example UK government leaders repeatedly mentioning it by name, e.g. Matt Hancock saying that despite being unwell, Boris Johnson is still having "Zoom videoconferences", or saying Johnson addressed his "Zoom cabinet", just feels... weird.

Edited to add: thinking about it more, I remember "FaceTime" being used pretty similarly when it was new. So I guess all the bad news is just sensitising me.

  • viraptor 6 years ago

    Zoom is popular. Enough that it's both the default for many people and the tech that gets brought up in discussions. My dance school uses zoom. My work uses zoom. Online courses use zoom. Maybe it's more noticeable when famous people mention it, but really - it's a default now. Even if there was some shady push for it, it's also organically massively popular.

    • fock 6 years ago

      trying to download the (self-installing) app twice _every_ time, whilst you're (actively) trying to join a meeting in your browser is the kind of organic popularity the yahoo toolbar had...

      • chatmasta 6 years ago

        Most people install the app and leave it installed.

        • fock 6 years ago

          you don't say. That way (and autostarting and nagging) you easily get a lot of popularity compared to a web-service (with most people being unaware of bookmarking features in their browser). That was the operating principle of a lot of crappy ad/malware companies back then this was still considered an ethical businessmodel. Seems we are seeing time repeat itself.

  • MobileVet 6 years ago

    Zoom is now ‘Kleenex’ or ‘Coke’ for video conferencing. Skype was the same when it came out... but they had far less competition at the time.

    This is a huge win for Zoom on a marketing front.

    • kerng 6 years ago

      Yep, showing up to uninvited random meetings by guessing IDs is now called Zoombombing apparently

  • complex1314 6 years ago

    Maybe they tried Skype first, which works horrible (tried twice, never managed connect all the participants at the same time), and finally relief over something that actually works. I have used Zoom successfully with 70 participants, and then breakout groups. The only alternative I can see that recently came to my attention is Jitsi Meet (https://jitsi.org/), which I will try next time I have the opportunity. But seems like it has at least one of the same weaknesses as zoom, with no end to end encryption (https://www.reddit.com/r/privacy/comments/7syt0s/jitsi_meet_...)

    • folmar 6 years ago

      You can also try BigBlueButton (https://bigbluebutton.org). Open source, and a lot of nice things done better than the usual online meeting standards (e.g. included whiteboard and slides are real slides and watchers have a lot of flexibility in watching them).

    • 1over137 6 years ago

      But Jitsi is open source and you can self-host it. Then there's no third party in a hostile country controlling anything.

    • _-___________-_ 6 years ago

      As far as I can find out, FaceTime is currently the only solution for "just works" (in the sense that your grandma could use it) videoconferencing that is e2e encrypted.

      • notechback 6 years ago

        But it only works if everyone has Apple devices, so it absolutely does not "just work" if even one family member doesn't have it.

        Most video chat apps are straightforward once set up on the phone.

        • _-___________-_ 6 years ago

          Are you aware of other video chat apps that support e2e-encrypted multi-party videoconference?

          • zeveb 6 years ago

            If there are no cross-platform apps which support e2e-encrypted multi-party videoconferences, then there simply is currently no solution at all for 'just works' secure videoconferencing, because part of just working is not requiring users to switch to a platform they otherwise would not.

  • tzm 6 years ago

    It's becoming a verb (vs brand) which reflects rising popularity and use.

  • kossTKR 6 years ago

    It is curious, and post revelations in the recent decade nothing is too weird to suspect - but don't underestimate the immense social value of jumping on the technological bandwagon and the free "hip" PR that it produces in media. And when more people do it, more people do it, i.e the bandwagon effect.

    People then look at the articles written in the media and say "hey i use that app too, cool, we are part of the same tribe".

    Showing of knowledge of the tech-zeitgeist is an easy way for a politician or anyone for that matter to appear being both with the times", "tech-savvy" and just the same as regular folk.

  • mrich 6 years ago

    Isn't it amazing how video conferencing gets reinvented time and time again?

  • bryanrasmussen 6 years ago

    well another thing is that zoom is a great name, on a marketing level.

    It implies speed, and thus implies power.

    Since you zoom in on things to see them better it implies attention to detail.

    The productivity of the prime minister is in no way hampered, people, he Zooms!

jalk 6 years ago

OT: My kids school uses zoom atm. Been connecting using the web client at https://zoom.us/wc/join/<meetingid without dashes>. Today however those links are returning 403 Forbidden (even tried multi) My knee-jerk reaction was that they have some way of capitalizing on installed software which they can't on the web-client. But of course it could simply be that the web-client requires more server resources and now have to curb its usage.

tony101 6 years ago

Original title: Zoom's Encryption is “Not Suited for Secrets” and Has Surprising Links to China

  • ddebernardyOP 6 years ago

    Yeah, I only kept the second part of the title when submitting it because it was a) too long and b) too clickbait-y.

    • SAI_Peregrinus 6 years ago

      It's using ECB mode. That doesn't even provide confidentiality. "Not suited for secrets" is entirely correct, and actually somewhat mild.

turowicz 6 years ago

I always knew that the "zoom.us" is a dodgy name for an installation file. As if someone was going an extra length to make sure you think its a US company.

  • tiborsaas 6 years ago

    It is a US company and the founder is american too.

    https://www.bloomberg.com/profile/company/ZM:US

    • jplayer01 6 years ago

      Aren’t most of their developers in China?

      • lain_ 6 years ago

        I'm not sure if/how that would even matter in the context.

        • jplayer01 6 years ago

          You don’t remember the whole Australia debacle when their government passed a law allowing them to secretly compel software developers to compromise whatever they’re working on? This is basically the same thing, where we know the Chinese government is capable and willing to coerce anybody in their grasp to serve in their interests. Guess where software developers in China happen to live? China. Where can the CCP most easily wield their power and influence? Also China.

    • unlinked_dll 6 years ago

      Is Eric Yuan a US citizen? He wasn't born or educated here so I don't know he considers himself American, and a significant amount of his company's product development is not done in America.

      Before this sounds anti-immigrant, I'm the product of immigrants like most Americans and I think the qualifier for being American is considering oneself American and having citizenship or on the path to get it.

      • alexlur 6 years ago

        He received his visa on his ninth try in the 90s. Is there anything that prompts you to doubt his citizenship?

        • unlinked_dll 6 years ago

          The numerous people I've worked with that have been here for decades and aren't citizens and don't consider themselves to be American?

  • throw445673 6 years ago

    I thought the “us” was like the word “Us”.

    So “Zoom Us” like “Call Us.”

fock 6 years ago

Well, that large majority of developers not is native-speaking seems highly likely if you only look at output of `zoom.sh` startup script.

No pun intended.

dogman144 6 years ago

"home grown encryption scheme" seems to imply Zoom is rolling its own crypto, which is tremendously foolish.

That isn't exactly the case, per the same article. More Zoom is choosing a poor choice among other choices, of implementing AES:

"Furthermore, Zoom encrypts and decrypts with AES using an algorithm called Electronic Codebook (ECB) mode, “which is well-understood to be a bad idea, because this mode of encryption preserves patterns in the input,” according to the Citizen Lab researchers. In fact, ECB is considered the worst of AES’s available modes."

Bad idea but not "rolling own crypto bad"

edit: agree it's bad. this is pointing out inaccuracies in language from tech journalism reporting on security. This continues to be an issue per the miseducation it creates for the general public in infosec concepts, which is already an uphill battle of misconceptions. Since these articles, or AG Barr, are the discussions that actually hit the mainstream, it's an issue that needs to correct.ed Tech journalism, a profession focused on 'getting the facts,' are the direct conduit of this version of miseducation/failure of facts, and should be corrected. See: NY Times Baltimore Ransomware = NSA Tool (false), Bloomberg Supermicro (false, so far), etc.

  • minitech 6 years ago

    > Bad idea but not "rolling own crypto bad"

    - misusing cryptographic primitives is one way of rolling one’s own crypto

    - ECB really is that bad

  • tpetry 6 years ago

    Even Wikipedia is stating ECB is a very bad choice. How can someone really use it nowadays without fraudulent intentions?

    • Diggsey 6 years ago

      Many of the alternative modes are unsuitable for this case, as it is being used to encrypt UDP packets which may be lost. There are two commonly used modes which support the random access needed here:

      - ECB - CTR

      Note that CTR is still recommended for use and is often used for things like hard-disk encryption where random access is required. Furthermore, the only difference between ECB and CTR is that CTR includes an incrementing counter in the input to the encryption algorithm to ensure that each encryption is unique. Do you know what else starts with an incrementing counter? UDP packets intended to form an audio or video stream.

      So yes: ECB can be bad, but there's no evidence that Zoom are actually using it incorrectly. Using CTR when you already have a non-repeating data stream would only add overhead and potentially negatively impact the amount of useful data that can be streamed.

      • hiq 6 years ago

        Is there a way to use ECB "correctly"?

        Is there any non-repeating data apart from noise (if even)?

        • Diggsey 6 years ago

          Yes, as I mentioned, if you include an incrementing counter within each block then the data does not repeat. The data only needs to be non-repeating within a single stream. Different streams will use a different IV and possibly different keys. This is how CTR works.

          • katzenjam 6 years ago

            Including a counter in each UDP packet does not make ECB mode equivalent to CTR mode.

            Let's assume the counter is at the start of the packet. An AES block is 16 bytes, so the counter ensures the first 16 bytes of ciphertext are unique across packets. But any patterns in the remainder of the packet are preserved, within and across packets.

    • _-___________-_ 6 years ago

      Most of Zoom's security problems seem like the kind of things a novice programmer who didn't know any better would do. Which may mean that they hire inexperienced programmers, or may mean that they wanted that as an excuse if they got caught. The former is probably more likely. After all, never attribute to malice what can adequately be explained by incompetence.

    • dogman144 6 years ago

      ECB is a standard mode on many crypto libraries. Devs don't know better, or are intimidated by IVs

  • _-___________-_ 6 years ago

    Using ECB for this is terrible. It's likely that you could quite trivially recover low-fidelity video from the encrypted stream.

    • Jabbles 6 years ago

      It works like that if you're encrypting a bitmap, but a compressed video stream is already fairly randomised. The encryption is broken, but low-res video extraction seems unlikely.

  • fock 6 years ago

    shipping a statically linked version of openssl 1.0.2o (Q2/18) is not building any trust either.

t0mas88 6 years ago

Keyservers in China may be a risk, but this sounds like a terrible idea: "The researchers also found that Zoom protects video and audio content using a home-grown encryption scheme"

kerng 6 years ago

It would be good for the title to contain that the encryption they use is broken.

senderista 6 years ago

It’s hard to take the rest of the article seriously when they criticize Zoom for using 128-bit AES.

  • senderista 6 years ago

    Downvoters: please name one scenario in which using AES with >128-bit keys adds any actual security margin, even in principle.

aabbcc1241 6 years ago

Why is it surprising ? I heard Zoom is China based dispute it's domain name has .us

Markoff 6 years ago

founder is Chinese, they have 700 employees in China, does anyone really consider this non Chinese app?

  • Markoff 6 years ago

    encryption keys issued in China, calls routed through China etc.

    I see denial is strong or HN has already it's army of wumaos.

AsyncAwait 6 years ago

I've really grown to dislike the "China == bad" thing, yes, they're domestically authoritarian, without excusing any of it, I like to act on hard evidence, not hear say, I am stunned that after the Bloomberg fiasco these kind of stories didn't take a hit.

P.S. Personally, I don't consider the NSA having my data as being any better, thank you.

EDIT: Just to be clear, I don't think Zoom's encryption claims should be trusted, but it's not because CHINAAA, it's because they're misleading people into thinking TLS means E2E.

  • hash872 6 years ago

    If encryption keys are stored in a country where the company is required, by law or by force, to turn them over to authorities upon request then that should be noted. And yes that includes the US to a lesser degree.

    When people say 'the server with the encryption keys is physically located in China, and they have many Chinese employees', the subtext that we should all know at this point is that they're required by Chinese law to turn everything over to the authorities. We have hard evidence & beyond hard evidence of this, so it's kind of assumed that educated people are aware of this. And yes the same goes for say US telecom companies having legally mandated backdoors & the US government exploiting this to conduct unauthorized surveillance or even just purely commercial spying, it's well-documented, everyone should know this. So in the future someone can say 'this telecom company is US-based' and we can all understand the subtext.

    So it's OK to just say 'the servers are in China' and we should all know what that means, at this point. TLDR- it's OK to have priors

  • petergatsby 6 years ago

    I've really grown to dislike the "people who presumably consider themselves ethical defending a regime that represses free speech and expression, brutally crushes dissenters, disappears ethical doctors, is led by a 'president for life' dictator, and has literally hauled off 1M muslims to internment campus where their organs are being harvested and their culture is being erased, thing".

upofadown 6 years ago

OK, this makes things clearer. Zoom does in fact encrypt their streams from client to client but they have easy access to the keys.

In their recent post about this question they apologize for what they admit to be an incorrect use of the phrase "end to end encryption". They base this on the existence of things like the gateways used to the regular telephone network.

It seems like an odd way to spin this. Why didn't they just state that the data is encrypted "end to end" and then leave it at that? Apple supposedly has access to the keys used to encrypt FaceTime calls but they happily involve the "end to end encryption" marketing phrase. I don't see why Zoom couldn't do the same. The way Zoom has handled this could of been a lot better.

I think the world needs a consumer standard for cryptography. Something like:

* Level 1 for the case where any eavesdropper can get the plain text.

* Level 2 for when just the provider can get the plain text.

* Level 3 for when just the users can get the plain text.

Most of what is being described as "end to end encrypted" these days is really just level 2 even in the case where the provider does not have the keys due to the fact that the provider can trivially MITM the traffic. The general public should be made aware of the distinction without having to dig into the technical details.

  • xtian 6 years ago

    Apple does not have access to FaceTime keys or iMessage keys for that matter. They are truly end-to-end encrypted, and I don’t think there is any need to cheapen or muddy the term for the sake of marketers.

    • ec109685 6 years ago

      They can still write software to insert themselves into the key exchange flow and eavesdrop on a conversation. E.g. I don’t believe there is anything stopping Apple from pretending a participant bought a new device.

      • thebean11 6 years ago

        That's a much less scary attack vector though, since they would also need to somehow impersonate the participants voice or image right?

        • upofadown 6 years ago

          Think of it as aiming a phone at another phone. Apple would decrypt everything and then reencrypt it.

      • xtian 6 years ago

        How would they spoof the 2FA from an existing device?

    • upofadown 6 years ago

      Perhaps as that was based on random internet comments. FaceTime still ends up at level 2 with Zoom and the rest because Apple can MITM the traffic without much trouble. There is no provision for the user to prevent/detect a MITM attack in FaceTime or iMessage.

      • xtian 6 years ago

        So you’re saying there should be a three-level consumer standard where the third level excludes any possible consumer product? Please don’t pretend that Apple and Zoom’s approaches are equivalent here. There is a substantial difference that deserves to be acknowledged. Anyone whose threat model includes Apple subverting their own security architecture shouldn’t be using any communication platforms.

        • upofadown 6 years ago

          There is nothing wrong with allowing a consumer to verify that they are talking to who they think they are talking to. Is Signal a consumer product?

          Zoom specifically states that they do not have access to session keys. Apple doesn't even make such a statement.

          • xtian 6 years ago

            What prevents Signal from MITMing their app?

            • upofadown 6 years ago

              The way everyone else does it. The user can verify the key fingerprint. Signal calls it the safety number.

              • xtian 6 years ago

                Why couldn’t they just change the client code to exfiltrate the user’s data?

  • zepto 6 years ago

    Apple doesn’t have access to the keys used to encrypt FaceTime calls. They are in fact end to end. Zoom is not.

    https://support.apple.com/en-us/HT209110

    • amaccuish 6 years ago

      Yes, Apple literally doesn't have access to the keys if they do nothing. If they do something, they have very easy access to the keys.

      • zepto 6 years ago

        That’s true in principle in every case where the software can be remotely updated.

        However in practice, making public statements like this and breaking them would have enormous reputational costs.

        Apple has put up a bigger stake on the truth of their encryption story than anyone else.

    • upofadown 6 years ago

      That's just a bald statement by the entity that would have to be deceitful. It doesn't even specify how the key exchange is done.

      • zepto 6 years ago

        I was responding to a ‘bald claim’ made by someone with no reputation at stake.

        Apple’s statement is stronger.

Keyboard Shortcuts

j
Next item
k
Previous item
o / Enter
Open selected item
?
Show this help
Esc
Close modal / clear selection