TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Wiretapping End-To-End Encrypted VoIP Calls: Real-World Attacks on ZRTP

117 pointsby TjWallasabout 8 years ago

4 comments

mtgxabout 8 years ago
For those interested, Signal doesn&#x27;t seem to use ZRTP anymore:<p>&gt; <i>The new Signal voice and video beta functionality eliminates the need for ZRTP. The &quot;signaling&quot; messages used to set up the voice&#x2F;video beta calls (offer&#x2F;answer SDPs, ICE candidates, etc) are transmitted over the normal Signal Protocol messaging channel, which binds the security of the call to that existing secure channel. It is no longer necessary to verify an additional SAS, which simplifies the calling experience.</i><p><a href="https:&#x2F;&#x2F;whispersystems.org&#x2F;blog&#x2F;signal-video-calls-beta&#x2F;" rel="nofollow">https:&#x2F;&#x2F;whispersystems.org&#x2F;blog&#x2F;signal-video-calls-beta&#x2F;</a><p>And it&#x27;s not in beta anymore:<p><a href="https:&#x2F;&#x2F;whispersystems.org&#x2F;blog&#x2F;signal-video-calls&#x2F;" rel="nofollow">https:&#x2F;&#x2F;whispersystems.org&#x2F;blog&#x2F;signal-video-calls&#x2F;</a>
评论 #13898452 未加载
评论 #13896235 未加载
评论 #13896239 未加载
rdtscabout 8 years ago
The more interesting would be to see how feasible is to crack the in band SAS authentication string, when callers verbally verify it.<p>Deep learning and ability to train on a specific callers&#x27; voice [1] then mimic it might be an interesting attack vector. In practice Silent Circle&#x27;s implementation does something interesting and instead of SAS numbers use dictionary words. So you end up with something like &quot;Pink Elephant Salad&quot;. Could probably MitM that. However callers are then supposed to make some extra puns or discuss it a bit and say something like &quot;Ha-ha! Wonder how tasty the an elephant salad would be&quot;. And if after MitM-ing, the string to the other side was &quot;Plastic Blue Llamas&quot; then a MitM attack becomes more obvious.<p>[1] <a href="http:&#x2F;&#x2F;research.baidu.com&#x2F;deep-voice-production-quality-text-speech-system-constructed-entirely-deep-neural-networks&#x2F;" rel="nofollow">http:&#x2F;&#x2F;research.baidu.com&#x2F;deep-voice-production-quality-text...</a>
评论 #13898399 未加载
评论 #13898285 未加载
lallysinghabout 8 years ago
AFAICT, This looks more like attacks on the implementations of ZRTP than on attempts to find weaknesses in the underlying protocol.
评论 #13898232 未加载
ameister14about 8 years ago
This is fascinating. Thanks for writing this paper, guys.