TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

About backdoors in crypto messengers

71 点作者 larma超过 8 年前

11 条评论

dbalan超过 8 年前
Some observations, 1. At this point its extremely hard to use XMPP - there are too many competing standards that implements encryption (of which a subset has forward secrecy), and if sender server doesn&#x27;t implement any the other end does, usually falls back to plain text, one can disable it - but this is just too much overhead for a regular user. (food for thought [1])<p>2. Again, reminder from countless HN comments - there is a PR in works to make GCM optional[2], as soon as its merged, this will be solved<p>3. Maps seems to the real problem here: this could be disabled after 2? (otherwise, whats the point?)<p>[1] <a href="https:&#x2F;&#x2F;whispersystems.org&#x2F;blog&#x2F;the-ecosystem-is-moving&#x2F;" rel="nofollow">https:&#x2F;&#x2F;whispersystems.org&#x2F;blog&#x2F;the-ecosystem-is-moving&#x2F;</a> [2] <a href="https:&#x2F;&#x2F;github.com&#x2F;WhisperSystems&#x2F;Signal-Android&#x2F;pull&#x2F;5962" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;WhisperSystems&#x2F;Signal-Android&#x2F;pull&#x2F;5962</a><p>edit: formatting, forward secrecy not e2e
评论 #13435254 未加载
roddux超过 8 年前
The backdoor referred to can be applied to any Android app that uses Google Maps. Also mentioned is that using the built-in Google keyboard is a vulnerability, because in theory it gives Google the ability to keylog you.<p>I supposed this boils down to knowing your adversaries. If you number Google amongst that list, life is going to be really difficult - no matter who you are.
评论 #13435055 未加载
评论 #13435177 未加载
评论 #13435120 未加载
_b8r0超过 8 年前
If you&#x27;re considering Google an adversary, perhaps you shouldn&#x27;t use stock Android, or any of their software.<p>If you&#x27;re considering Google an adversary, and use a version of Android without Google support, you can&#x27;t use Signal anyway.
评论 #13435034 未加载
评论 #13435152 未加载
Sir_Cmpwn超过 8 年前
&gt;tl;dr: There is a “backdoor” in Signal nobody cares about, only Google can use it.<p>Speak for yourself. This backdoor is the reason why I don&#x27;t use Signal.
评论 #13435084 未加载
评论 #13435123 未加载
gcb0超过 8 年前
for the record, firefox for android also integrates the google backdoor for the sole purpose of allowing chromecast for videos... which zero users use or want.
评论 #13435479 未加载
评论 #13435969 未加载
binaryapparatus超过 8 年前
It seems that if you really want proper secure channel you need to write one yourself. Anything out there is subject to being compromised.<p>Is there open source alternative for Signal?
评论 #13435785 未加载
评论 #13435027 未加载
评论 #13435046 未加载
评论 #13435003 未加载
评论 #13435263 未加载
arghwhat超过 8 年前
tl;dr: this is stupid.<p>People seem to love analyzing security of tiny corners of systems while ignoring the rest of the system, and entirely avoiding figuring out a scope for the security.<p>The post complains about Signal using a Google service, that Google could utilize (either now or through an update) for malicious activity. A Google service that without a fair share of poking around is only available on <i>Google</i> versions of Android. I mean, <i>what</i>.<p>While this is a more serious problem than the usual whine about GCM (Yes, notifications can give a lot of info, but in case of Signal, the info given is &quot;You received something from some Signal user while you were offline&quot;), it is still amazing how blind the analysis seem to the environment. If you cannot trust Google to provide a &quot;non-evil&quot; Google play services, why the flying fuck do you think the Google-provided (or manufacturer-under-tight-google-control-provided) OS is fine? They could backdoor the process isolation and poke around at Signal memory if they felt like it.<p>Now, if you are security conscious and willing to let go of the conveniences of selling your soul to Google, you would be running a non-Google&#x27;d version of Android without Google services. Your only valid complaint in this case, is that Signal depends on Google services to operate, which makes you unable to use it (without hacking Google back into your Android version, but if you do that you might just as well stick to a Google version).<p>Oh, and what about the black box binary drivers you are using on your super-secure handset? Baseband? CPU (ME anyone?)? SIM card?<p>Before you talk about security, figure out what you are trying to protect against, and start from the top. You look like an idiot if you complain about breakable windows but do not notice that the door is open.
评论 #13435512 未加载
评论 #13435683 未加载
评论 #13435416 未加载
评论 #13436967 未加载
tcoppi超过 8 年前
Can we please stop calling these types of vulnerabilities &quot;backdoors&quot;?
评论 #13435432 未加载
snowpanda超过 8 年前
&gt;This code is included by calling the createPackageContext-method together with the flags CONTEXT_INCLUDE_CODE and CONTEXT_IGNORE_SECURITY. The latter is a requirement as the android system would deny loading code from untrustworthy sources otherwise (for a good reason). The code is then executed in the Signal process, which includes access to the Signal history database and the crypto keys.<p>---------------------------<p>Glad someone points out the technical details of why many people had doubts about signal. Unfortunately, Moxie will dismiss it, and his following will claim &quot;it affects other apps too&quot; as if that makes it any better. &quot;Other apps do it too&quot; is not the standard a &quot;privacy&quot; app should aim for.
dutchbrit超过 8 年前
Blog seems to be down, and cannot find a cached version in Google :(
评论 #13434888 未加载
throw2016超过 8 年前
It difficult to see how a service that ties to your phone number can make any claim about privacy halfway seriously. This is reckless.<p>And worse tie itself to a company whose business model is based on creepily stalking you all over the internet and getting users psychologically accustomed to the fact they are under surveillance. These are serious escalations that go unnoticed because SV has become a magnet for those who want to profit from it.<p>A half way serious and sincere effort will be open source, not tied in any remote way to known surveillance companies, and based in a country that genuinely respects privacy.
评论 #13436044 未加载