zlacker

[parent] [thread] 12 comments
1. senect+(OP)[view] [source] 2020-06-05 02:33:45
will only happen if phone manufactures ship them by default rather than the unsecure by default ones they ship atm.

Sounds crazy when I say it outloud...

replies(2): >>RL_Qui+T2 >>loyukf+5c
2. RL_Qui+T2[view] [source] 2020-06-05 03:01:16
>>senect+(OP)
iMessage is end to end encrypted by default. Perhaps not as strongly, but it's a good default to begin with.
replies(3): >>Nextgr+93 >>sfifs+88 >>driver+M51
◧◩
3. Nextgr+93[view] [source] [discussion] 2020-06-05 03:03:14
>>RL_Qui+T2
Key management is still centralized and controlled by Apple, so they can still MITM communications by messing with the key exchange.

iCloud backups (enabled by default) are not end-to-end encrypted.

So while it's technically E2E, in practice you get very little protection from it because it's broken by design.

I still use iMessage because of the user experience, but let's not be fooled by their misleading E2E claims; it's all just marketing BS.

replies(1): >>ciaran+w3
◧◩◪
4. ciaran+w3[view] [source] [discussion] 2020-06-05 03:06:04
>>Nextgr+93
If both parties disable iCloud on their phones, does Apple have any way to read messages sent via iMessage?
replies(3): >>frisco+M5 >>Nextgr+l9 >>sneak+bq
◧◩◪◨
5. frisco+M5[view] [source] [discussion] 2020-06-05 03:27:17
>>ciaran+w3
We have no idea and there’s no real way even in principle for us to know.
◧◩
6. sfifs+88[view] [source] [discussion] 2020-06-05 03:56:42
>>RL_Qui+T2
Whenever key management is centralized, there is basically no security from the legal authority in the jurisdiction that the messaging vendor is located in. The vendor can always push you an MITM key. They can even show you the "correct" recipient key when you physically verify but use a different one for the actual message transfer and this would be a trivial easy to obfuscate switch in the program binary.

E2E with centralized key management is primarily to protect you from casual/private threats (vendor employees, snoopers in your or your recipients network) not from legal authority.

replies(1): >>TheSpi+nd
◧◩◪◨
7. Nextgr+l9[view] [source] [discussion] 2020-06-05 04:16:55
>>ciaran+w3
They can still pull off an MITM attack by sending the MITM’s keys (pretending to be the other user’s keys) because they control they key exchange.

It’s an active attack and can’t apply retroactively but within these constraints they can still do it.

8. loyukf+5c[view] [source] 2020-06-05 04:52:01
>>senect+(OP)
WhatsApp isn't installed by default AFAIK, but it is one of the first apps installed by millions, if not billions, on their phones.

In Korea, Taiwan and Japan, LINE became the de facto IM. In China, WeChat. But ain't sure if these are usually/always preinstalled in those markets.

Cheers.

replies(1): >>bgee+ig
◧◩◪
9. TheSpi+nd[view] [source] [discussion] 2020-06-05 05:08:21
>>sfifs+88
The Signal Foundation is based in Mountain View and both Moxie Marlinspike and Brian Acton are US nationals...

What’s stopping some US government agency from forcing them to insert code that causes the Signal app to a indicate it is behaving correctly but isn’t?

And don’t say “laws”.

If your threat model includes advanced persistent threats all bets are off.

◧◩
10. bgee+ig[view] [source] [discussion] 2020-06-05 05:51:15
>>loyukf+5c
In Korea I think the de facto IM is Kakao, LINE is only third (after FB messager) [0][1].

[0]: https://www.statista.com/statistics/898254/south-korea-most-...

[1]: https://www.quora.com/Which-is-the-most-popular-messaging-ap...

replies(1): >>loyukf+Vr
◧◩◪◨
11. sneak+bq[view] [source] [discussion] 2020-06-05 07:52:09
>>ciaran+w3
Yes, if they add a wiretapping key to one or both of your key lists, which is silent/invisible to the sender.
◧◩◪
12. loyukf+Vr[view] [source] [discussion] 2020-06-05 08:09:35
>>bgee+ig
Thanks.
◧◩
13. driver+M51[view] [source] [discussion] 2020-06-05 14:03:45
>>RL_Qui+T2
Regardless of its security features it's Apple device only which is a deal breaker.
[go to top]