TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

How to intercept all Wire voice and video calls

58 pointsby ge0rgover 8 years ago

5 comments

walterbellover 8 years ago
Wire is fantastic and I hope they address this authentication issue soon. What is the value of verifying contact fingerprints if other communication stages are not verified?<p>I would like to see more disclosure on server retention of encrypted messages and documents, especially when:<p>(a) msgs&#x2F;docs have been delivered to all devices<p>(b) msg &#x2F; doc has been manually deleted by the sender<p>Twitter posts [1] suggest that encrypted msgs are retained on the server for weeks, even if already delivered. This creates an attack target. Wire has promised to open-source their Haskell server code, so maybe the community can help remove this technical limitation by implementing a proper store-and-forward mechanism.<p>It would also be good to have the option of choosing P2P E2E msgs that go directly between devices and never touch the Wire server. This would only be useful for synchronous conversations, but would again reduce the central server as an attack target.<p>[1] <a href="https:&#x2F;&#x2F;twitter.com&#x2F;wire&#x2F;status&#x2F;822421405937659908" rel="nofollow">https:&#x2F;&#x2F;twitter.com&#x2F;wire&#x2F;status&#x2F;822421405937659908</a>
ge0rgover 8 years ago
Tl;dr: Wire voice and video chats use SRTP encryption, but the key is transmitted over the Wire server using normal TLS without further authentication checks or Certificate Pinning. A Wire employee or malicious government could MitM the claimed end to end encryption.
评论 #13444759 未加载
AdmiralAsshatover 8 years ago
Can someone explain how Certificate Pinning works in a &quot;trust no one&quot; scenario? From my understanding, the idea is that you grab the certificate for a given domain once with the correct public key and then store it for later so that you can be notified when you&#x27;re being MitM&#x27;d. But that assumes that the one you got was trustworthy to begin with: what happens if you&#x27;re <i>already</i> a target or in a surveillance state and, having not previously visited the domain before, cannot guarantee that the pinned certificate you&#x27;re getting is trustworthy?
评论 #13445627 未加载
zokierover 8 years ago
&gt; transmitted in plaintext over a normal TLS connection<p>I think we have differing views on what &quot;plaintext&quot; means.<p>Also, like it or not, it really looks like the calls are actually end-to-end encrypted, as in the server never sees or processes the cleartext content. Being possibly poorly designed and open to attacks does not change the fundamental underlying model.
zmanianover 8 years ago
What should happen is either<p>- A shared key should be passed over the e2e text channel and used as part of the DTLS setup. I&#x27;m unclear if this actually a possibility in WebRTC.<p>- Each side can send a fingerprint of the peers public key to each other over the text channel and the software can authenticate there is no MITM