After presenting our work at Real World Crypto 2018 [1] and seeing the enormous press coverage, we want to get two things straight: 1. Most described weaknesses are only exploitable by the malicious server or by knowing a large secret number and thereby the protocols are still very secure (what we wrote in the paper but some newspapers did not adopt) and 2. we see ways to enhance the WhatsApp protocol without breaking its features.


We are of course very happy that our research reached so many people and even though IT security and cryptography are often hard to understand for outsiders, Andy Greenberg [2], Patrick Beuth [3] and other journalists [4,5,6,7,8] wrote articles that were understandable on the one hand and very accurate and precise on the other hand. In contrast to this, we also saw some inaccurate articles [9,10] that fanned fear and greatly diverged in their description from what we wrote in our paper. We expected this from the boulevard press in Germany and therefore asked them to stick to the facts when they were contacting us. But none of the worst two articles' [9,10] authors contacted us in advance. Since our aim was never to blame any application or protocol but rather we wanted to encourage the developers to enhance the protocols, it contradicts our aim that WhatsApp and Signal are partially declared attackable by "anyone" "easily" [9,10].

Against this background, we understand Moxie's vexation about certain headlines that were on the Internet in the last days [11]. However, we believe that the ones who understand the weaknesses, comprehend that only the malicious server can detectably make use of them (in WhatsApp) or the secret group ID needs to be obtained from a member (in Signal). As such, we want to make clear that our paper does not primarily focus on the description of weaknesses but presents a new approach for analyzing and evaluating the security of group instant messaging protocols. Further we propose measures to enhance the analyzed protocols. The description of the protocols' weaknesses is only one part of the evaluation of our analysis approach and thereby of the investigation of real world protocols. This is the scientific contribution of our paper. The practical contribution of the analyzed messengers, which is the communication confidentiality for billion users (in most cases), is great and should be noted. Therefore we believe that being Signal, WhatsApp, or Threema by applying encryption to all messages and consequently risking research with negative results is much better than being a messenger that does not encrypt group messages end-to-end at all. We do not want to blame messengers that are far less secure (read Moxie's post [11] if you are interested).

Finally we want note that applying security measures according to the ticket approach (as we call it in the paper [12]) to the invitation links would solve the issues that Facebook's security head mentioned in his reply [13] on our findings. To our knowledge, adding authenticity to group update messages would not affect invitation links: If no invitation link was generated for a group, group members should only accept joining users if they were added by an authentic group update message. As soon as a group invitation link was generated, all joining users would need to be accepted as new group members with the current design. However there are plenty ways how WhatsApp could use invitation links without endowing the server with the power to manage groups without the group admins' permission:
One approach would be generating the invitation links secretly and sharing them without the knowledge of the server. An invitation link could then contain a secret ticket for the group and the ID of the group. As soon as a user, who received the link, wants to join the group, she can request the server with the group ID to obtain all current group members. The secret ticket can now be sent to all existing group members encrypted such that the legitimate join can be verified.

Of course this would require engineering but the capability of WhatsApp, shipping drastic protocol updates, can be assumed since they applied end-to-end encryption in the first place.

[1] https://www.youtube.com/watch?v=i5i38WlHfds
[2] https://www.wired.com/story/whatsapp-security-flaws-encryption-group-chats/
[3] http://www.spiegel.de/netzwelt/apps/whatsapp-gruppenchats-schwachstelle-im-verschluesselungs-protokoll-a-1187338.html
[4] http://www.sueddeutsche.de/digital/it-sicherheit-wie-fremde-sich-in-whatsapp-gruppenchats-einladen-koennen-1.3821656
[5] https://techcrunch.com/2018/01/10/security-researchers-flag-invite-bug-in-whatsapp-group-chats/
[6] http://www.telegraph.co.uk/technology/2018/01/10/whatsapp-bug-raises-questions-group-message-privacy/
[7] http://www.handelsblatt.com/technik/it-internet/verschluesselung-umgangen-forscher-finden-sicherheitsluecke-bei-whatsapp/20836518.html
[8] https://www.heise.de/security/meldung/WhatsApp-und-Signal-Forscher-beschreiben-Schwaechen-verschluesselter-Gruppenchats-3942046.html
[9] https://www.theinquirer.net/inquirer/news/3024215/whatsapp-bug-lets-anyone-easily-infiltrate-private-group-chats
[10] http://www.dailymail.co.uk/sciencetech/article-5257713/WhatsApp-security-flaw-lets-spy-private-chats.html
[11] https://news.ycombinator.com/item?id=16117487
[12] https://eprint.iacr.org/2017/713.pdf
[13] https://twitter.com/alexstamos/status/951169036947107840

Further articles:
- Matthew Green's blog post: https://blog.cryptographyengineering.com/2018/01/10/attack-of-the-week-group-messaging-in-whatsapp-and-signal/
- Schneier on Security: https://www.schneier.com/blog/archives/2018/01/whatsapp_vulner.html
- Bild: http://www.bild.de/digital/smartphone-und-tablet/whatsapp/whatsapp-sicherheitsluecke-in-gruppenchats-54452080.bild.html
- Sun: https://www.thesun.co.uk/tech/5316110/new-whatsapp-bug-how-to-stay-safe/
Continue reading
  1. Tools For Hacker
  2. Hacker Tools Software
  3. What Are Hacking Tools
  4. Hacking Tools Mac
  5. Hacker Tools Free Download
  6. Hacker Tools List
  7. Hacker Tools Free Download
  8. Pentest Tools Free
  9. Hack Tools Mac
  10. Ethical Hacker Tools
  11. How To Install Pentest Tools In Ubuntu
  12. Hacker Tools Free
  13. Black Hat Hacker Tools
  14. How To Make Hacking Tools
  15. Pentest Tools Apk
  16. Pentest Tools
  17. Hacker Tools For Pc
  18. Pentest Tools Github
  19. Hack Tools Pc
  20. Hack Tools For Games
  21. World No 1 Hacker Software
  22. Hack Tools Mac
  23. Install Pentest Tools Ubuntu
  24. Hacker Tools Linux
  25. Hacker
  26. Hacking Tools For Games
  27. Pentest Tools For Windows
  28. Growth Hacker Tools
  29. Hacker Tools Hardware
  30. Hack Tools
  31. Game Hacking
  32. Hack Tools For Windows
  33. Pentest Tools Website
  34. Kik Hack Tools
  35. Hacker Tool Kit
  36. Hacker Tools List
  37. Beginner Hacker Tools
  38. Pentest Tools For Mac
  39. Physical Pentest Tools
  40. Nsa Hack Tools Download
  41. Hacker Tools Free
  42. Hack Tools Mac
  43. Tools For Hacker
  44. Pentest Tools Linux
  45. Hack Apps
  46. Pentest Tools Android
  47. Hacking Tools Name
  48. Pentest Tools Review
  49. Tools For Hacker
  50. Hackrf Tools
  51. Hacking Tools Windows 10
  52. Hacker Techniques Tools And Incident Handling
  53. Pentest Tools
  54. Hack Tools For Pc
  55. Hacker Tools Free
  56. Termux Hacking Tools 2019
  57. Pentest Tools Apk
  58. Hack Tools For Mac
  59. Install Pentest Tools Ubuntu
  60. Hacker Tools Mac
  61. Hacker Tools Apk
  62. Nsa Hack Tools Download
  63. Hacker Tools Software
  64. Physical Pentest Tools
  65. Hacks And Tools
  66. Hacking Tools Pc
  67. World No 1 Hacker Software
  68. Hacker
  69. Hacker Search Tools
  70. Hacker Tools 2020
  71. Hacking Tools For Beginners
  72. Pentest Tools Review
  73. Beginner Hacker Tools
  74. Top Pentest Tools
  75. Hak5 Tools
  76. Github Hacking Tools
  77. Hacker Tools For Windows
  78. Hacker Tools Online
  79. Pentest Tools Framework
  80. Top Pentest Tools
  81. Pentest Tools Find Subdomains
  82. Pentest Tools Framework
  83. Hack Tools Online
  84. Pentest Tools Github
  85. Hack Tools Pc
  86. Hack Tools For Mac
  87. Hacking Tools
  88. Hack And Tools
  89. Nsa Hack Tools Download
  90. Hacking Tools For Windows 7
  91. Hacker Tools Hardware
  92. Pentest Tools Framework
  93. Hackers Toolbox
  94. Hacking Tools Windows
  95. Hack And Tools
  96. Hacking Tools Hardware
  97. Bluetooth Hacking Tools Kali
  98. Hacking Tools Github
  99. Hacking Tools Hardware
  100. Wifi Hacker Tools For Windows
  101. Hacking Tools For Windows
  102. Pentest Tools For Ubuntu
  103. Pentest Tools Review
  104. Hack Tools
  105. Hacker Tools List
  106. Hacker Tools Apk Download
  107. Hack Tools Download
  108. Tools For Hacker
  109. Hacking App
  110. Hacking Tools 2020
  111. Hacker Tools For Windows
  112. What Is Hacking Tools
  113. Hacking Tools Free Download
  114. Pentest Tools Nmap
  115. Hacker Tools 2019
  116. Hacker Tools 2020
  117. Hacker Tools Free
  118. Hacker
  119. Hacker Tools 2020
  120. Tools Used For Hacking

0 comments:

Post a Comment