TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

If You Can’t Break Crypto, Break the Client: Recovery of Plaintext iMessage Data

282 pointsby cgtyoderabout 9 years ago

14 comments

endymi0nabout 9 years ago
For the depressing truth on the crypto wars: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=7757978" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=7757978</a> (Crypto won&#x27;t save you either [PDF])<p>...or to paraphrase Jeff Atwood: &quot;I love crypto, it tells me what part of the system not to bother attacking&quot;
评论 #11456222 未加载
评论 #11455977 未加载
评论 #11456932 未加载
评论 #11456918 未加载
评论 #11458354 未加载
tlrobinsonabout 9 years ago
The fake URL in a JavaScript comment in the the JavaScript URI is a hilarious and neat trick.<p><pre><code> javascript:&#x2F;&#x2F;bishopfox.com&#x2F;research?%0d%0aalert(1) </code></pre> gets interpreted as:<p><pre><code> &#x2F;&#x2F;bishopfox.com&#x2F;research? alert(1) </code></pre> Fortunately most browsers prevent you from pasting JavaScript URIs in the URL bar these days.<p>It&#x27;s a little surprising Apple overlooked not one but two fairly obvious major holes: allowing JavaScript URIs, and the lack of same-origin policy. I wonder how many other applications are similarly vulnerable.
评论 #11457622 未加载
theseatomsabout 9 years ago
This is the article that years ago convinced me it&#x27;s not worth obsessing about my own technological privacy: <a href="http:&#x2F;&#x2F;www.gaudior.net&#x2F;alma&#x2F;johnny.pdf" rel="nofollow">http:&#x2F;&#x2F;www.gaudior.net&#x2F;alma&#x2F;johnny.pdf</a><p>I despise the &quot;if you have nothing to hide...&quot; argument for the surveillance state. And I argue against it every chance I get.<p>But, practically speaking, I <i>don&#x27;t</i> have much to hide. I also realized that one can draw <i>more</i> attention to oneself by taking drastic measures to preserve one&#x27;s own privacy.<p>I know, citation needed... I believe FB (or a related party) released some research about detecting &quot;holes in the social network&quot;. Browser fingerprinting is another front on which I&#x27;ve probably made myself more unique to trackers.
评论 #11458183 未加载
评论 #11457168 未加载
TazeTSchnitzelabout 9 years ago
Apple use a web view for messages? I would&#x27;ve thought they&#x27;d use native UI. I guess it&#x27;s easier to handle text properly with HTML.
评论 #11456011 未加载
评论 #11456116 未加载
bengotowabout 9 years ago
Man, that&#x27;s depressing. It&#x27;s fairly easy to prevent this particular kind of injection—you just have to add a Content Security Policy to the HTML page. The appropriate value for web pages running from file:&#x2F;&#x2F;, with no expectation of downloading and executing remote JavaScript is: `script-src &#x27;self&#x27;;`<p>Really sad to see that Apple is using embedded web views without these sort of basic protections. I bet worse exploits than this are possible, given that they probably expose parts of the ObjectiveC layer through the JavaScriptCore bridge.
评论 #11456848 未加载
tibbonabout 9 years ago
It looks like the code was pulled from Github<p><a href="https:&#x2F;&#x2F;github.com&#x2F;BishopFox&#x2F;cve-2016-1764" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;BishopFox&#x2F;cve-2016-1764</a>
评论 #11455715 未加载
评论 #11455534 未加载
Capiraabout 9 years ago
Simplified POC:<p><pre><code> javascript:&#x2F;&#x2F;%0aprompt()</code></pre>
评论 #11456099 未加载
lukashedabout 9 years ago
Does anyone know how they managed to open the console &#x2F; inspector inside iMessage.app?
评论 #11456832 未加载
评论 #11456754 未加载
kuschkuabout 9 years ago
We’ll see a lot more of this soon, considering more and more software is moving to webkit UIs, often with similar flaws.
评论 #11458726 未加载
haddrabout 9 years ago
In case of Android what you only need is that your application can read notifications (and has notifications&#x2F;accessibility permissions). E.g. all whatsapp messages go through it...
评论 #11458022 未加载
评论 #11456669 未加载
dmh2000about 9 years ago
that&#x27;s pretty much the approach on all crypto. crack the implementation, not the algorithm.
评论 #11455250 未加载
knownabout 9 years ago
&quot;Never do anything against conscience even if the state demands it.&quot; --Einstein
yaloozeabout 9 years ago
I had a similar thought with WhatsApp&#x27;s Signal announcement. I believe that on iOS, by default all WhatsApp messages are backed up to iCloud Drive. So that would seem to be an easier attack vector.
评论 #11455378 未加载
评论 #11455167 未加载
评论 #11456414 未加载
gravypodabout 9 years ago
This isn&#x27;t the only thing you can do without breaking crypto. If exploits are too hard because you are lazy like me: check out CreepyDOL.