WhatsApp rayed: Model encryption largely useless

Status
Not open for further replies.

Terry Ganzi

Level 26
Thread author
Verified
Top Poster
Well-known
Feb 7, 2014
1,540
I had to translate it to bring the news.

wa-encryption-d1999f774c5b5757.png


To answer the question how trustworthy the used of WhatsApp for several months end-to-end encryption, c't has it come under scrutiny: While WhatsApp uses the proper technique a lot that still use is not.

For some time WhatsApp encrypted messages, the user not only in transport, butwhen two Android interlocutors also end-to-end . How Tests by heise Security under the WhatsApp-gravity in c't 11/15 showed the exemplary TextSecure encryption is actually used in everyday life but with only limited benefits. Especially because you can rely on it is not that they actually used.

The team at heise Security examined, among other things, the encryption of the data packets of the Messengers. It could be confirmed that in the sent test basis of Android smartphones News really the end-to-end encryption is used by TextSecure. Messages from, or to iPhones have been shipped, however, without the end-to-end encryption.Normal WhatsApp users can not tell the difference.

In the tests by heise Security the Wireshark packet sniffer and the unofficial WhatsApp client came yowsup used. Because the source code of the open source project yowsup is open, the tool could be used with some small changes for the diagnosis of encryption.

Details about the investigation in the background article at heise Security:

The theme WhatsApp encryption is also part of WhatsApp-gravity in the new edition of c't 11/15:

( fab )
 
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top