TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

WhatsApp Backdoor/Vulnerability demonstration [video]

49 pointsby sajidover 8 years ago

8 comments

Javantea_over 8 years ago
It now is a lot more clear what&#x27;s going on here. The discoverer of this issue is basing his argument on the fact that when you verify a fingerprint, you are now confident that your end-to-end encryption won&#x27;t transparently send your encrypted data to someone with a different keypair. The other side of the argument is that if WhatsApp actually did what you expect, data would be lost when a person switched phones in the middle of someone sending them a message. As a person who doesn&#x27;t switch phones very often, I would prefer an end-to-end encryption to never send data to a different public key than the one I&#x27;ve used before. I would rather lose data than divulge it to a third party who has the ability to spoof the recipient&#x27;s phone. This would only come up whenever someone switched their phone when I was sending them a message, so it&#x27;s pretty rare.<p>To me the trade off is a no brainer, and apparently to Facebook and Whisper Systems the trade off is a no brainer in the opposite direction.
评论 #13400835 未加载
评论 #13401319 未加载
y7over 8 years ago
For those not wanting to watch 14 minutes of video, here is the author&#x27;s blog post explaining the vulnerability: <a href="https:&#x2F;&#x2F;tobi.rocks&#x2F;2016&#x2F;04&#x2F;whats-app-retransmission-vulnerability&#x2F;" rel="nofollow">https:&#x2F;&#x2F;tobi.rocks&#x2F;2016&#x2F;04&#x2F;whats-app-retransmission-vulnerab...</a>
nodesocketover 8 years ago
I could be wrong, but he just puts the sender phone in Airplane mode and then sends a few messages. Then he swaps the sim card from the receivers &quot;Laura&#x27;s&quot; phone to the government&#x27;s phone. Then the government&#x27;s phone is able to view the messages sent while the sender&#x27;s phone was in Airplane mode. Is that really the vulnerability?
评论 #13400888 未加载
评论 #13400772 未加载
dogma1138over 8 years ago
Hmm doesn&#x27;t WhatsApp puts a red system message when the phone or key is changed?<p>When I talked to my gf the other day noticed it when she switched her work phone.
评论 #13400790 未加载
评论 #13400765 未加载
activatedgeekover 8 years ago
There was another article claiming there&#x27;s no backdoor. <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=13394900" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=13394900</a>.<p>Anybody with any ideas what is happening exactly?
评论 #13400777 未加载
评论 #13400730 未加载
评论 #13400725 未加载
评论 #13400731 未加载
评论 #13400770 未加载
评论 #13400727 未加载
评论 #13400743 未加载
truncheonover 8 years ago
The premise here, being that powerful (or technically adept) people may have the capacity to impersonate a phone number, or clone a SIM card.<p>...since that part isn&#x27;t directly stated, and might not be obvious to everyone.
评论 #13400966 未加载
mavhcover 8 years ago
Seems like Facebook should start testing, turn on security notifications for 1% of users, see what happens
jMylesover 8 years ago
I think the past few days of back-and-forth about this issue have made a few things clear:<p>1) The double-check was not widely understood as an indicator of any particular security state prior to the attention this has gotten.<p>2) Is it fairly easy to imagine a scenario in which the behavior of WhatsApp can be readily exploited - think of a journalist on the ground in Tahrir Square using WhatsApp to report on conditions, neither expecting nor receiving replies or confirmations, perhaps for hours at a time.<p>3) The matter of whether this is a &quot;backdoor&quot; or not is contentious, but also not terribly important to the stakeholders.<p>4) Moxie wholesale approves of the WhatsApp implementation.<p>5) WhatsApp does in fact provide substantial security for a common and important use case.<p>So, where do we go from here?<p>I think that those of us that care about freedom in the information age well-advised to remember that Moxie has done incredible, substantial, and landscape-shifting work in this space.<p>Nevertheless, I also think that Moxie can provide a few more details and thoughts that will be hugely helpful to the community in thinking through the coming years of IM security.<p>Specifically, I will quote the comment I made in the other article, addressing Moxie directly:<p>Moxie,<p>I think it&#x27;s fair to say that you are the world thought leader on these matters right now.<p>One thing that the rest of us are wondering right now is:<p>&gt; (Quoting Moxie, in response to my comment) I&#x27;ve been impressed with the level of care that WhatsApp has given to that requirement.<p>To what degree do you really know that? Is there a place where we can read about your interactions with Facebook, the level of access they&#x27;ve given you, and the degree to which they have allowed your recommendations to shape the contours of their implementation?<p>Nothing less than the strength of dissent lies in the balance of questions like these.<p>&gt; I think we should all remain open to ideas about how we can improve this UX within the limits a mass market product has to operate within, but that&#x27;s very different from labeling this a &quot;backdoor.&quot;<p>I agree that the jump to scary terminology is dangerous.<p>However, at the end of the day, I think that many of us have been trying to make a simple point that shows that there is a sort of crossing of that line:<p>WhatsApp claimed that they were simply unable to intercept communications, and now we find out that, without any user interaction or approval, messages which haven&#x27;t received the &quot;double check&quot; are re-transmitted when a new key is generated.<p>So look: nobody here is trying to diminish your tireless work and your accomplishments in bringing freedom into the information age.<p>But there are nuances here that are important, and fleshing them out is a big part of what this community is about.