TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

CryptoCat iOS Application Penetration Test [pdf]

168 pointsby secalexabout 11 years ago

13 comments

kaeporanabout 11 years ago
Hi, I&#x27;m the lead developer for Cryptocat. I strongly urge you all to please read our blog post regarding this audit: <a href="https://blog.crypto.cat/2014/04/recent-audits-and-coming-improvements/" rel="nofollow">https:&#x2F;&#x2F;blog.crypto.cat&#x2F;2014&#x2F;04&#x2F;recent-audits-and-coming-imp...</a><p>This audit document alone does not give enough context. This audit was commissioned by us and concerns a pre-release version of Cryptocat for iPhone. Many of the bugs it found are due to the fact that it was reviewing a prototype with debugging features (such as NSLog) turned on. While this audit definitely does find some vulnerabilities and room for improvement, none of the critical bugs in this audit ever made it to Cryptocat for iPhone&#x27;s release.<p>It&#x27;s very unfortunate that this audit is being taken out of context like this and used to attack our effort. I&#x27;d appreciate it if you could please upvote this comment and help me contextualize this audit. Again, please, read the blog post for context (and also for the results of another audit we comissioned in parallel.) We&#x27;ve done our best to address these issues and are working towards an open discussion on how to improve accessible encryption. <a href="https://blog.crypto.cat/2014/04/recent-audits-and-coming-improvements/" rel="nofollow">https:&#x2F;&#x2F;blog.crypto.cat&#x2F;2014&#x2F;04&#x2F;recent-audits-and-coming-imp...</a><p>The blog post&#x27;s last section (&quot;On the Significance of Audits&quot;) discusses why it is that Cryptocat has seen more audits published about it than other encryption projects. Please, dare to discern. Read what we&#x27;re doing to improve the security of accessible encryption and our reasoning for publishing these audits. I&#x27;ll be grateful for you taking the time to read on what we&#x27;re doing and I am more than happy to discuss with you and answer your questions.
评论 #7519506 未加载
评论 #7519465 未加载
评论 #7519471 未加载
评论 #7520191 未加载
评论 #7519486 未加载
评论 #7519425 未加载
评论 #7519510 未加载
评论 #7519419 未加载
primitivesuaveabout 11 years ago
This is most alarming.<p><i>CryptoCat&#x27;s OTR implementation on all platforms allows a chat peer to change their OTR key during a chat session without user notification. An attacker performing a man-in-the-middle attack against the client&#x27;s XMPP or HTTPS stream can inject their own OTR key in the discussion after a user has authenticated their peer&#x27;s OTR fingerprint. This permits the attacker to decrypt all messages that follow, and no user would have reason to suspect the compromise.</i>
评论 #7519280 未加载
评论 #7520508 未加载
rancorabout 11 years ago
When I saw one of the main CryptoCat developers present in 2012, I came away with the impression that nobody on the core team understood crypto, security, or software engineering. This audit is another rock on the mountain of evidence I&#x27;ve seen supporting this impression in the following years.<p>A really nice job by iSec, though.
评论 #7519253 未加载
评论 #7519266 未加载
natdempkabout 11 years ago
Also of interest is their blog post about how they plan to handle the issues described in this report: <a href="https://blog.crypto.cat/2014/04/recent-audits-and-coming-improvements/" rel="nofollow">https:&#x2F;&#x2F;blog.crypto.cat&#x2F;2014&#x2F;04&#x2F;recent-audits-and-coming-imp...</a><p>Reading that, I still am not sure why anyone would use CryptoCat especially with things like TextSecure on the market that seem to take crypto far more seriously. The only reason I can see for that is that they have clients on more platforms, but if this is similar to the state of all of them, then what&#x27;s the point?
评论 #7519204 未加载
评论 #7519383 未加载
venomsnakeabout 11 years ago
There is a &quot;many ways to skin a cat&quot; joke here somewhere. It is actually terrible - the hmac timing attack requires around 3 minutes of google searching to avoid and is basic public domain knowledge. The other are much worse.
评论 #7519225 未加载
lincolnqabout 11 years ago
This is awesome. I&#x27;m sad that CryptoCat is getting slammed for this for being one of the brave few to post this online. I am sure there are an infinite number of &quot;security-critical&quot; apps which would fail an audit like this, but who never even thought to GET an audit -- much less post it online. The software development community is much stronger for being able to see professional stuff like this posted.<p>Does anyone know how much these audits typically cost, if you&#x27;re not being subsidized?
评论 #7519972 未加载
zooko_LeastAuthabout 11 years ago
Here is our blog post about our audit of Cryptocat, which was also announced today: <a href="https://leastauthority.com/blog/" rel="nofollow">https:&#x2F;&#x2F;leastauthority.com&#x2F;blog&#x2F;</a>
imkevinxuabout 11 years ago
Didn&#x27;t realize how vulnerable even a simple NSLog was... I wonder how many websites have sensitive information they console.log but forgot to take out for production
评论 #7519127 未加载
jnbicheabout 11 years ago
Wow, remind me to never have an audit done by iSec. &quot;Extremely thorough&quot; would have been tough but appropriate, but &quot;brutal&quot; seems just gratuitously provocative. Was that what you were going for?<p>Edit: OK, apologies to iSec for my mistake. I thought he was still affiliated with them. In any case, it looks like a top-notch report, so it would have been a shame to detract from that accomplishment.
评论 #7519790 未加载
secfirstmdabout 11 years ago
I for one think that Nadim and the Open Tech Fund are to be applauded for opening up their review to the public. I have to wonder how many other commercial and non-profit organisations would ever consider doing this? (Especially those which are in the field of communications and are relied on by people for their lives).<p>Many people on HN seem to be reading the review without actually looking at Nadim&#x27;s response on the Cryptocat blog - which I urge everyone to read first before commenting.<p><a href="https://blog.crypto.cat/2014/04/recent-audits-and-coming-improvements/" rel="nofollow">https:&#x2F;&#x2F;blog.crypto.cat&#x2F;2014&#x2F;04&#x2F;recent-audits-and-coming-imp...</a><p>As far as I understand the username for Nadim (Kaeporan) was also blocked from HN last night so probably he isn&#x27;t able to continue responding to the comments up here.
lawnchair_larryabout 11 years ago
Huh, this was apparently submitted by Alex Stamos, a co-founder of iSec partners (who did this audit). And he editorialized the title, &quot;Brutal Professional Audit of CryptoCat Published.&quot;<p>Your former company did an audit for a customer, then you posted it to HN calling it &quot;Brutal&quot;? Really?
评论 #7526543 未加载
评论 #7519982 未加载
评论 #7519623 未加载
oafitupaabout 11 years ago
The good thing about CryptoCat is that everyone wants to trash it, so it&#x27;s becoming better.
评论 #7520085 未加载
评论 #7526350 未加载
Wintamuteabout 11 years ago
@secalex Dumb post man. Way to de-contextualise something, cause a drama and damage reputations needlessly.
评论 #7519736 未加载