Seenthis
•
 
Identifiants personnels
  • [mot de passe oublié ?]

  • https://robertheaton.com

/2017

  • ►/10
    • ►/09
      • ►/tracking-friends-and-strangers-using-whatsapp
  • @liotier
    liotier @liotier CC BY-SA 9/10/2017
    1
    @gastlag
    1

    Tracking friends and strangers using #WhatsApp
    ►https://robertheaton.com/2017/10/09/tracking-friends-and-strangers-using-whatsapp #privacy #surveillance

    https://robertheaton.com/images/whatsapptracker1.png

    liotier @liotier CC BY-SA
    Écrire un commentaire
  • @nicod_
    nicod_ @nicod_ 13/01/2017
    4
    @alda
    @etraces
    @erratic
    @apichat
    4

    WhatsApp backdoor allows snooping on encrypted messages | Technology | The Guardian
    ▻https://www.theguardian.com/technology/2017/jan/13/whatsapp-backdoor-allows-snooping-on-encrypted-messages

    https://i.guim.co.uk/img/media/e0b86d2ee841139ae521879f0a6203633ed59631/90_485_3592_2156/master/3592.jpg?w=1200&h=630&q=55&auto=format&usm=12&fit=crop&crop=faces%2Centropy&bm=normal&ba=bottom%2Cleft&blend64=aHR0cHM6Ly91cGxvYWRzLmd1aW0uY28udWsvMjAxNi8wNS8yNS9vdmVybGF5LWxvZ28tMTIwMC05MF9vcHQucG5n&s=4511fcf1c2179dc35d68058df6970a95

    #whatsapp #backdoor

    nicod_ @nicod_
    • @sandburg
      Sandburg @sandburg CC BY-SA 13/01/2017

      Même pas étonnant.
      De toute façon, les gens préfèrent que l’état puisse lire leurs données plutôt que Mark Zuckerberg. C’est con, WhatsApp permet plutot l’inverse.

      Sandburg @sandburg CC BY-SA
    • @erratic
      schrödinger @erratic 14/01/2017

      “WhatsApp has the ability to force the generation of new encryption keys for offline users, unbeknown to the sender and recipient of the messages, and to make the sender re-encrypt messages with new keys and send them again for any messages that have not been marked as delivered.

      The recipient is not made aware of this change in encryption, while the sender is only notified if they have opted-in to encryption warnings in settings, and only after the messages have been re-sent. This re-encryption and rebroadcasting effectively allows WhatsApp to intercept and read users’ messages.”

      schrödinger @erratic
    • @erratic
      schrödinger @erratic 14/01/2017

      Mais surtout:

      “[the researcher] reported the vulnerability to Facebook in April 2016, but was told that Facebook was aware of the issue, that it was “expected behaviour” and wasn’t being actively worked on.”

      schrödinger @erratic
    • @apichat
      Apichat @apichat CC BY-SA 14/01/2017

      La dénégation de Moxie Marlinspike au nom de son entreprise Open Whisper Systems qui a travaillée sur le logiciel WhatsApp.

      Je ne sais pas trop quoi en penser...

      There is no WhatsApp ’backdoor’
      moxie0 on 13 Jan 2017
      ▻https://whispersystems.org/blog/there-is-no-whatsapp-backdoor

      The WhatsApp clients have been carefully designed so that they will not re-encrypt messages that have already been delivered. Once the sending client displays a “double check mark,” it can no longer be asked to re-send that message. This prevents anyone who compromises the server from being able to selectively target previously delivered messages for re-encryption.

      The fact that WhatsApp handles key changes is not a “backdoor,” it is how cryptography works. Any attempt to intercept messages in transmit by the server is detectable by the sender, just like with Signal, PGP, or any other end-to-end encrypted communication system.

      The only question it might be reasonable to ask is whether these safety number change notifications should be “blocking” or “non-blocking.” In other words, when a contact’s key changes, should WhatsApp require the user to manually verify the new key before continuing, or should WhatsApp display an advisory notification and continue without blocking the user.

      Given the size and scope of WhatsApp’s user base, we feel that their choice to display a non-blocking notification is appropriate. It provides transparent and cryptographically guaranteed confidence in the privacy of a user’s communication, along with a simple user experience. The choice to make these notifications “blocking” would in some ways make things worse. That would leak information to the server about who has enabled safety number change notifications and who hasn’t, effectively telling the server who it could MITM transparently and who it couldn’t; something that WhatsApp considered very carefully.

      Apichat @apichat CC BY-SA
    • @nicod_
      nicod_ @nicod_ 17/01/2017

      Plus d’explications :
      ▻http://www.lemonde.fr/pixels/article/2017/01/16/whatsapp-accuse-de-mal-proteger-les-communications-de-ses-utilisateurs-le-vr

      nicod_ @nicod_
    • @apichat
      Apichat @apichat CC BY-SA 17/01/2017

      Et une réponses aux réponses :

      WhatsApp vulnerability explained : by the man who discovered it - Tobias Boelter ▻https://www.theguardian.com/technology/2017/jan/16/whatsapp-vulnerability-facebook?CMP=share_btn_tw

      Il pointe notamment une évidence qui semble « échapper » à l’Electronic Frontier Foundation : WhatsApp n’étant pas un logiciel libre et le réseau WhatsApp n’étant pas accessible à des logiciels clients tiers : il n’est pas possible de vérifier le comportement réel de WhatsApp. Bref il n’est pas possible d’affirmer que WhatsApp est sécurisé.

      Apichat @apichat CC BY-SA
    • @marielle
      marielle 🐢 @marielle 21/12/2017

      ►https://robertheaton.com/2017/10/09/tracking-friends-and-strangers-using-whatsapp

      marielle 🐢 @marielle
    Écrire un commentaire