Group Instant Messaging: Why Blaming Developers Is Not Fair But Enhancing The Protocols Would Be Appropriate

After presenting our work at Real World Crypto 2018 [1] and seeing the enormous press coverage, we want to get two things straight: 1. Most described weaknesses are only exploitable by the malicious server or by knowing a large secret number and thereby the protocols are still very secure (what we wrote in the paper but some newspapers did not adopt) and 2. we see ways to enhance the WhatsApp protocol without breaking its features.


We are of course very happy that our research reached so many people and even though IT security and cryptography are often hard to understand for outsiders, Andy Greenberg [2], Patrick Beuth [3] and other journalists [4,5,6,7,8] wrote articles that were understandable on the one hand and very accurate and precise on the other hand. In contrast to this, we also saw some inaccurate articles [9,10] that fanned fear and greatly diverged in their description from what we wrote in our paper. We expected this from the boulevard press in Germany and therefore asked them to stick to the facts when they were contacting us. But none of the worst two articles' [9,10] authors contacted us in advance. Since our aim was never to blame any application or protocol but rather we wanted to encourage the developers to enhance the protocols, it contradicts our aim that WhatsApp and Signal are partially declared attackable by "anyone" "easily" [9,10].

Against this background, we understand Moxie's vexation about certain headlines that were on the Internet in the last days [11]. However, we believe that the ones who understand the weaknesses, comprehend that only the malicious server can detectably make use of them (in WhatsApp) or the secret group ID needs to be obtained from a member (in Signal). As such, we want to make clear that our paper does not primarily focus on the description of weaknesses but presents a new approach for analyzing and evaluating the security of group instant messaging protocols. Further we propose measures to enhance the analyzed protocols. The description of the protocols' weaknesses is only one part of the evaluation of our analysis approach and thereby of the investigation of real world protocols. This is the scientific contribution of our paper. The practical contribution of the analyzed messengers, which is the communication confidentiality for billion users (in most cases), is great and should be noted. Therefore we believe that being Signal, WhatsApp, or Threema by applying encryption to all messages and consequently risking research with negative results is much better than being a messenger that does not encrypt group messages end-to-end at all. We do not want to blame messengers that are far less secure (read Moxie's post [11] if you are interested).

Finally we want note that applying security measures according to the ticket approach (as we call it in the paper [12]) to the invitation links would solve the issues that Facebook's security head mentioned in his reply [13] on our findings. To our knowledge, adding authenticity to group update messages would not affect invitation links: If no invitation link was generated for a group, group members should only accept joining users if they were added by an authentic group update message. As soon as a group invitation link was generated, all joining users would need to be accepted as new group members with the current design. However there are plenty ways how WhatsApp could use invitation links without endowing the server with the power to manage groups without the group admins' permission:
One approach would be generating the invitation links secretly and sharing them without the knowledge of the server. An invitation link could then contain a secret ticket for the group and the ID of the group. As soon as a user, who received the link, wants to join the group, she can request the server with the group ID to obtain all current group members. The secret ticket can now be sent to all existing group members encrypted such that the legitimate join can be verified.

Of course this would require engineering but the capability of WhatsApp, shipping drastic protocol updates, can be assumed since they applied end-to-end encryption in the first place.

[1] https://www.youtube.com/watch?v=i5i38WlHfds
[2] https://www.wired.com/story/whatsapp-security-flaws-encryption-group-chats/
[3] http://www.spiegel.de/netzwelt/apps/whatsapp-gruppenchats-schwachstelle-im-verschluesselungs-protokoll-a-1187338.html
[4] http://www.sueddeutsche.de/digital/it-sicherheit-wie-fremde-sich-in-whatsapp-gruppenchats-einladen-koennen-1.3821656
[5] https://techcrunch.com/2018/01/10/security-researchers-flag-invite-bug-in-whatsapp-group-chats/
[6] http://www.telegraph.co.uk/technology/2018/01/10/whatsapp-bug-raises-questions-group-message-privacy/
[7] http://www.handelsblatt.com/technik/it-internet/verschluesselung-umgangen-forscher-finden-sicherheitsluecke-bei-whatsapp/20836518.html
[8] https://www.heise.de/security/meldung/WhatsApp-und-Signal-Forscher-beschreiben-Schwaechen-verschluesselter-Gruppenchats-3942046.html
[9] https://www.theinquirer.net/inquirer/news/3024215/whatsapp-bug-lets-anyone-easily-infiltrate-private-group-chats
[10] http://www.dailymail.co.uk/sciencetech/article-5257713/WhatsApp-security-flaw-lets-spy-private-chats.html
[11] https://news.ycombinator.com/item?id=16117487
[12] https://eprint.iacr.org/2017/713.pdf
[13] https://twitter.com/alexstamos/status/951169036947107840

Further articles:
- Matthew Green's blog post: https://blog.cryptographyengineering.com/2018/01/10/attack-of-the-week-group-messaging-in-whatsapp-and-signal/
- Schneier on Security: https://www.schneier.com/blog/archives/2018/01/whatsapp_vulner.html
- Bild: http://www.bild.de/digital/smartphone-und-tablet/whatsapp/whatsapp-sicherheitsluecke-in-gruppenchats-54452080.bild.html
- Sun: https://www.thesun.co.uk/tech/5316110/new-whatsapp-bug-how-to-stay-safe/

More information


  1. Hacking Apps
  2. Ethical Hacker Tools
  3. Hacker Tools 2020
  4. Hack Website Online Tool
  5. Install Pentest Tools Ubuntu
  6. Pentest Tools Kali Linux
  7. Pentest Tools Review
  8. How To Hack
  9. Hack Tools Download
  10. Hack Tools Online
  11. Hacker Tools Hardware
  12. New Hack Tools
  13. Hack Tools 2019
  14. Computer Hacker
  15. Hack And Tools
  16. Hacking Tools For Beginners
  17. Hack App
  18. Hack Website Online Tool
  19. Pentest Tools
  20. Hacker Tools Mac
  21. Pentest Tools Free
  22. Pentest Box Tools Download
  23. Hacker Tools For Ios
  24. Hacking Tools For Games
  25. Hack Tool Apk No Root
  26. Hacking Tools For Windows
  27. Computer Hacker
  28. Pentest Tools Review
  29. Pentest Tools Tcp Port Scanner
  30. Growth Hacker Tools
  31. Hacking Apps
  32. Pentest Tools Framework
  33. Game Hacking
  34. Hacker Tools
  35. Hacking Tools For Mac
  36. Hack Tools Online
  37. Hacking Tools Free Download
  38. Hack Tools For Pc
  39. Hacker Tools For Ios
  40. Pentest Recon Tools
  41. Hack Tools For Mac
  42. Pentest Tools Windows
  43. Pentest Tools Review
  44. Hacking Tools For Kali Linux
  45. How To Make Hacking Tools
  46. Hacking Tools For Mac
  47. Hacking Tools Online
  48. Free Pentest Tools For Windows
  49. Pentest Tools Apk
  50. Hack Tools
  51. Hack Apps
  52. Hacking Tools Github
  53. Pentest Tools Tcp Port Scanner
  54. Install Pentest Tools Ubuntu
  55. Hacker Techniques Tools And Incident Handling
  56. Usb Pentest Tools
  57. Hacking Tools And Software
  58. Hacking Tools Software
  59. Pentest Tools For Android
  60. Growth Hacker Tools
  61. Hacker Tools Linux
  62. Hack Tool Apk
  63. Hacking Tools For Beginners
  64. Hacker Tools Apk Download
  65. How To Hack
  66. Pentest Recon Tools
  67. Hacking Tools Mac
  68. How To Hack
  69. Hack Tools Github
  70. Pentest Tools Kali Linux
  71. Hacking Tools Usb
  72. Hacker Tools Online
  73. Hacking Tools For Windows 7
  74. Computer Hacker
  75. Pentest Tools Find Subdomains
  76. Pentest Tools Alternative
  77. Best Pentesting Tools 2018
  78. Pentest Tools Free
  79. Physical Pentest Tools
  80. Nsa Hack Tools Download
  81. Hacking Tools Online
  82. Install Pentest Tools Ubuntu
  83. Hacker Tools For Windows
  84. Hack Tools
  85. Hacking Tools 2019
  86. Pentest Tools Apk
  87. Github Hacking Tools
  88. Pentest Tools Free
  89. Hacking Tools For Windows
  90. Pentest Tools Url Fuzzer
  91. Blackhat Hacker Tools
  92. Pentest Tools Download
  93. Hack Tools Pc
  94. Hack App
  95. Hacker Tools Free Download
  96. Hacking Tools For Games
  97. Hack Tools For Windows
  98. Hacking Tools Free Download
  99. Physical Pentest Tools
  100. Ethical Hacker Tools
  101. Hack Tools
  102. Hacking Tools For Windows Free Download
  103. Hacking Tools For Mac
  104. Hacker Tools Linux
  105. Tools For Hacker
  106. Hacker Tools Linux
  107. Hacking Tools 2019
  108. Hacking Tools For Windows 7
  109. Hacker Tools Apk
  110. Hack Website Online Tool
  111. Kik Hack Tools
  112. Pentest Tools Android
  113. Hacker Tools 2020
  114. Hack Tools Pc
  115. Hacker Tool Kit
  116. Hack Tools Download
  117. Hacking Tools Online
  118. Hacking Tools Windows 10
  119. Hacker Tools 2019
  120. Hack Website Online Tool
  121. Pentest Tools For Windows
  122. Hack Tools 2019
  123. Hacker Tools Online
  124. Hack Tools For Pc
  125. Pentest Tools Nmap
  126. Game Hacking
  127. Hack Tools
  128. Pentest Tools For Mac
  129. Hack Tools For Pc
  130. Pentest Tools Website
  131. Tools Used For Hacking
  132. Hack Tools Download
  133. Hack Tools Online
  134. Hacking Tools Usb
  135. Pentest Tools Website
  136. Hack Tools Online
  137. Pentest Tools Find Subdomains
  138. Pentest Tools Tcp Port Scanner
  139. Pentest Tools List
  140. Pentest Tools Review
  141. Hack Tool Apk
  142. Hacker Tools Windows
  143. Nsa Hack Tools
  144. Hack Tools For Mac
  145. Hacking Tools 2020
  146. Pentest Tools Download
  147. Tools For Hacker
  148. Pentest Tools Alternative
  149. Install Pentest Tools Ubuntu
  150. Hacker Tools Hardware
  151. Hackrf Tools
  152. Hack Apps
  153. Hacker Tools Apk Download
  154. Hacking Tools Mac
  155. Best Hacking Tools 2020
  156. Pentest Tools Apk

No comments:

Post a Comment