Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Security Facebook

Security Experts Rebut The Guardian's Report That Claimed WhatsApp Has a Backdoor (gizmodo.com) 114

William Turton, writing for Gizmodo: This morning, the Guardian published a story with an alarming headline: "WhatsApp backdoor allows snooping on encrypted messages." If true, this would have massive implications for the security and privacy of WhatsApp's one-billion-plus users. Fortunately, there's no backdoor in WhatsApp, and according to Alec Muffett, an experienced security researcher who spoke to Gizmodo, the Guardian's story is a "major league fuckwittage." [...] Fredric Jacobs, who was the iOS developer at Open Whisper Systems, the collective that designed and maintains the Signal encryption protocol, and who most recently worked at Apple, said, "Nothing new. Of course, if you don't verify keys Signal/WhatsApp/... can man-in-the-middle your communications." "I characterize the threat posed by such reportage as being fear and uncertainty and doubt on an 'anti-vaccination' scale," Muffett, who previously worked on Facebook's engineering security infrastructure team, told Gizmodo. "It is not a bug, it is working as designed and someone is saying it's a 'flaw' and pretending it is earth shattering when in fact it is ignorable." The supposed "backdoor" the Guardian is describing is actually a feature working as intended, and it would require significant collaboration with Facebook to be able to snoop on and intercept someone's encrypted messages, something the company is extremely unlikely to do. "There's a feature in WhatsApp that -- when you swap phones, get a new phone, factory reset, whatever -- when you install WhatsApp freshly on the new phone and continue a conversation, the encryption keys get re-negotiated to accommodate the new phone," Muffett told Gizmodo. Other security experts and journalists have also criticized The Guardian's story.
This discussion has been archived. No new comments can be posted.

Security Experts Rebut The Guardian's Report That Claimed WhatsApp Has a Backdoor

Comments Filter:
  • by Wowsers ( 1151731 ) on Friday January 13, 2017 @09:48AM (#53660613) Journal

    It would be nice if The Guardian produced a list for the average person of the most popular software that has known backdoors like Skype, so people can see how compromised they are under pretext of "tackling terrorism".

    • Re: (Score:2, Insightful)

      by Anonymous Coward

      Does Skype even count as backdoored? It needs a new term, like glasshoused or NSAware.

    • If alice trusts the provider to tell her that bob is bob and bob trusts the provider to tell him alice is alice then it's all too easy for the provider to pretend to be alice when talking to bob and pretend to be bob when talking to alice.

      If you care about provider snooping then you need to use tools where you manage your own keys.

      • Re:Compromise (Score:5, Informative)

        by Tom ( 822 ) on Friday January 13, 2017 @10:32AM (#53660869) Homepage Journal

        Different problem.

        Yes, the provider could initiate a man-in-the-middle attack against all users from the start. However, let us assume that he didn't do that, for various reasons that are for a seperate discussion.

        In such a scenario, Alice conversation with Bob is secure. It requires only the initial secure key exchange. Once that is complete, they are fine.

        But with the backdoor of silent key-renegotiation, the provider can at any time decide that now they want to eavesdrop into this or that conversation. Say, because a government agency asked them nicely, or a FB employee looked up that woman he met last night in the database and found her WhatsApp number...

        It is a different scenario with different ramifications.

        • by alecm ( 4035 )

          >"provider can at any time decide that now they want to eavesdrop into this or that conversation"

          and having hijacked one message in this scenario, what happens to the rest of the conversation? what happens to that message, too?

        • by stooo ( 2202012 )

          if the provides manages the keys, you're toast.
          So never never use watsapp.

          • by Tom ( 822 )

            That is what I was saying just without any of the technical details.

            In a good system, the provider would not manage the keys. He would only provide the means for the initial key exchange (if for whatever reason he decides to not use DH).

  • Well, apparently [nbcnews.com] the President Elect of the USA [salon.com] believes [twitter.com] the anti-vaccination idea, so...soon it will move on from "fear and doubt" into "official policy".
  • Wat? (Score:4, Insightful)

    by Ol Olsoc ( 1175323 ) on Friday January 13, 2017 @09:58AM (#53660681)
    Fuckwittage? Anti-Vaxxer references? Hope this guy has a newsletter.

    Well, first off, I'm going to be a little suspicious of experts who find fuckwittage in their dictionary, when a stupid cacahead reference will do. I dunno that taking a temper tantrum reassures me all that much.

    My guideline is that if it is allowed, it is visible to someone who wants to see it badly enough.

    • That's racist. Well no it isn't but language such as that is a sign of upbringing and local colloquial language rather than a sign of intelligence or how much someone knows about a field.

      But feel free to bias based on language rather than on fact.

      • That's racist.

        Ah, a term used so much it is like saying "Scotch tape" or Xerox copy.

        Well no it isn't but language such as that is a sign of upbringing and local colloquial language rather than a sign of intelligence or how much someone knows about a field.

        But feel free to bias based on language rather than on fact.

        Aren't you doing the exact same thing as you accuse me of doing? And facts are good, and highly indicated in this discussion. I approve. But "Fuckwittery" is rather difficualt to prove as a fact. "fuckwittery" tells us about the person claiming it though.

        Now I don't know about you, but if I'm trying to convince people that something is safe when someone else says it isn't, I'll probably use explanatory terms, and not call those folks w

  • All those "ignorable" things are the reason why security eventually fails.
  • by Anonymous Coward

    The supposed "backdoor" the Guardian is describing is actually a feature working as intended, and it would require significant collaboration with Facebook to be able to snoop on and intercept someone's encrypted messages, something the company is extremely unlikely to do

    That sounds like a back door to me. Who trusts facebook anyway?

    • To use the usual paraphrasing of Mandy Rice Davies' immortal words "well he would say that wouldn't he?"

    • by Desler ( 1608317 )

      Exactly. They already lied about data sharing when buying WhatsApp in the first place. So why should anyone believe they wouldn't invest in the effort to exploit this hole. Are people still really so naive.?

      • by alecm ( 4035 )

        >"So why should anyone believe they wouldn't invest in the effort to exploit this hole"

        Because it would be cheaper and far more secure, convenient an scalable to build a _real_ back door.

        • by Desler ( 1608317 )

          So then change this behavior and silence all the backdoor claims. That would seem to be less effort than all this spin doctoring and PR damage control. Sorry, the "promise" of a liar holds no merit.

          • by alecm ( 4035 )

            Oh, prove a negative, you mean?

            • by Desler ( 1608317 )

              No, not at all. Fixing this specific behavior would be trivial to do. The fact that it's not being done so and you and others are trying to tell us to ignore it just trust that a data-mining company with a history of lying is absurd.

    • Exactly. Denying there's a backdoor while acknowledging there is a backdoor, but they *promise* not to use it.. Hardly reassuring, and a pretty lousy rebuttal.

      • by Desler ( 1608317 )

        Considering how much spin doctoring is going on, the safer bet is that Facebook already is working on or already has completed the work to exploit this for eavesdropping.

  • Can I quote you on that?

    The Guardian has created a big name for itself for the massive scoops it has delivered.

    Sometimes this leads to the unrealistic expectation that the scoops can keep being manufactured at a steady rate. Trying too hard much?

  • First, this is really old news picked up by the Guardian: https://tobi.rocks/2016/04/wha... [tobi.rocks] That's almost a year old! Second, this is not the biggest security issue IMHO: default WhatsApp behaviour is to backup all your messages unencrypted to Google Drive, therefore, if a government wants to read your messages, they'll just ask Google! (the content is inaccessible by you, but not to them! https://developers.google.com/... [google.com] )
  • "The supposed "backdoor" the Guardian is describing is actually a feature working as intended, and it would require significant collaboration with Facebook to be able to snoop on and intercept someone's encrypted messages, something the company is extremely unlikely to do."

    A backdoor that requires Facebook's help to snoop is still a backdoor, is it not?

    • by durrr ( 1316311 )

      A backdoor that allows facebook to snoop means that it's already in full use for datamining and resale for advertisement and well paying government agencies.

  • by Anonymous Coward

    If it's no big deal, where's the option to disable this autorenegotiation of keys, assuming that I'm not fussed about whether my messages migrate when I update my handset, but am fussed about Facebook having the technical means to give a copy of my supposedly secure messages to any random phone that their system authenticates?

  • Comment removed (Score:5, Insightful)

    by account_deleted ( 4530225 ) on Friday January 13, 2017 @10:23AM (#53660797)
    Comment removed based on user account deletion
    • EXACTLY. I went into a lot more detail and rambling in my own comment, but you are 100% right.

    • it's owned by Facebook.

    • The Whatsapp client is proprietary and closed source.

      It should be assumed to be compromised regardless of what anyone says about it.

      We would but our tinfoil hats fell off.

  • missing the point (Score:5, Informative)

    by Tom ( 822 ) on Friday January 13, 2017 @10:26AM (#53660813) Homepage Journal

    He is missing the point.

    The article is not speaking about an encryption flaw or anything like that, but about a backdoor - a feature that allows Facebook, without any code changes on your device or other intrusion - to eavesdrop on any conversation you are having.

    A good encryption would be impenetrable even to the vendor. It should not allow the keys to be changed underneath you. It should not warn you afterwards about this fact, and only if you have a special option enabled, but it should tell you before it does a key change, and require your consent.

  • There is a problem in my opinion and denial won't get it fixed. Sure you need to renegotiate keys with a new device but it should not happen automagically without your knowledge. You should have to do it manually and it should not be done for you based on an assumption and all your messages be resent with the new keys.

  • Whatsapp's defaults do not prevent MiTM and do not even warn you something's afoot.
    That's doubleplus bad.
    I think we can leave it at that without the drama.
  • by cloud.pt ( 3412475 ) on Friday January 13, 2017 @10:55AM (#53661007)

    Some disclaimer:
    I have moderate IT Security experience. I'm admittedly not the ITSec convention-going type, but I've developed for solid security, done successful penetration testing on people's code and the likes... From the guardian's article, and from my POV, the major issue here is one of wording: a Backdoor is a feature, one intentionally added by developers and hidden from the end user-facing stuff such as UI and (R)TFM. This is definitely not a backdoor - it looks like a flaw, probably associated with different use cases of whatsapp vs the original API, considering it happens on verbose conditions, and it surely seems tricky to replicate without very explicit user behavior. Apparently even a change in defaults by whatsapp can solve this.

    Now for the real issue:
    How can anyone even start arguing about an article's guilt on this or Whatsapp intentions without tackling the subject that: every closed source app claiming privacy (such as whatsapp), however you paint it, can never do so as guaranteed without being open source. There is one way, and one way only, that privacy can be achieved without having to trust on privacy policies, disclosures, public legal action or even secretive court orders and it is to open source the damn thing and providing a way of building that outputs the same without the branding (think Chromium or the Mozilla suite in Debian).

    Here's the deal: Whatsapp states it uses the Whisper API but they might as well not use it. Whisper and Signal might state they collaborate and trusts they do use it, but who is to say they aren't being paid for this, lying or even chain-trusting blindly in Whatsapp statements of use? Oh wait, so there's a legal binding document saying Whatsapp actually does this... BIG DEAL. There are also constitutions being RAPED EVERY DAY by US, Chinese, Russian, (every country?) security services.

    Snowden advises on using Signal for two essential reasons that cannot be taken apart:
    1. he has access to the shyt going on inside and...
    2. he actually understands that shyt.

    Number one is the big deal here, and number 2 is the reason he publicly admits his support for Signal - people trust his technical judgement. Granted, no.1 won't make much sense to 99% of the world at which point you have to start trusting on someone's technical ability, reputation and honor, and for fuck sake Whatsapp is a commercial application based in the US - they HAVE to lie about such things, they don't even get a choice. Just having no.1 is like placing your neck under the sword of the entire world community. It's a lot better than a feature list, and advert, a legal document, someone's word. it's everybody's word.

    This is no conspiration theory, but logic beats trust, and most here, as engineers should be very aware of that. Even the trust in one's own actions isn't fallible - some people lie to themselves, some people don't know better than to believe they have failed at something and will trust blindly on their own ability. But sooner or later everybody finds out we are only as perfects as what we are made of. SHOW ME WHAT YOUR APP IS MADE OF and you will have the right for my complete blind trust (because it just isn't blind anymore). It can even be coded in esperanto (intentional bullshit here). It's the only way it is honestly submitted for scrutiny of your own statements of privacy and security.

    • This. The reason WhatsApp implemented end-to-end encryption is just to stop judges from asking for "message logs". It is a PR move where they can (eventually) establish that they cannot read the messages themselves (even if they can). This "backdoor" is a non-issue: If you trust WhatsApp's word that the app is actually "secure" and keys are only known to the devices, then you can simply always check the fingerprints to be sure that no spurious "key regeneration" has happened (or change the appropriate setti
  • And this was a program championed by a supposedly smart security researcher - Moxie.

    Good thing I don't trust people who say "You should trust this encryption!" because they've all been proven wrong historically.

  • by Bigjeff5 ( 1143585 ) on Friday January 13, 2017 @12:17PM (#53661511)

    If you don't trust WhatsApp to faithfully regenerate encryption keys, why the hell did you trust them to generate the initial keys in the first place? They could have just given Facebook a key then and let them listen in to your messages at any time. ANY messaging app, no matter how secure, can do this.

    This is not a backdoor, it's an inherent vulnerability in all encryption systems. If you don't trust one end of the encryption, it doesn't matter if the keys are only generated once or if they're generated over and over, or if you're notified when they're regenerated or if they just regenerate them on the fly. At any point, an untrustworthy server can simply make a valid key for a third party, and your encryption is compromised.

    This is a non-story. You know what 99% of people do in Signal when they get a notification that their encryption key has changed? They hit OK and re-send the message, just like WhatsApp does by default.

    It's just like EULA's, nobody pays attention to those damn thigns. WhatsApp just skips the step of asking you to verify the encryption change unless you go into the settings and explicitly tell it to notify you. For most people, that's exactly the appropriate behavior.

  • It is downgrading the security. Normally, an attacker would need to steal your key or the receiving end (you and the other person in turns) will get "wrong key, somebody is doing something BAD" warnings.

    Whatsapp doesn't do this. Whatsapp displays a message "the remote end has changed its security number[sic!]". But only if you activated it in the settings. Else you get NO HINT AT ALL.

    The next point are unsent messages. The report seems to exaggerate there a bit. The problem here: Go offline, type some messa

  • Schneier mentions this vulnerability as a real threat on his blog. https://www.schneier.com/blog/... [schneier.com] Did he actually endorse anything that says it isn't? (The link on the main page of slashdot.org claims he did.)

Interchangeable parts won't.

Working...