Security backdoor found in end-to-end encryption system used in WhatsApp

A security researcher has found a backdoor in the end-to-end encryption system used by the WhatsApp messaging service. The vulnerability would allow Facebook to read messages sent through the supposedly-secure system, as well as making it possible for the company to comply with court orders to make messages available to government bodies.

While end-to-end encryption would normally mean that not even the company operating the service can decrypt messages, only the intended recipient, the specific implementation used in WhatsApp includes a major security hole …

The Guardian reports that Tobias Boelter, a cryptography and security researcher at the University of California, Berkeley, discovered that WhatsApp has the ability to force a change of encryption key whilst offline. Any unsent messages would then be transmitted with the new key. With the default app settings, neither sender nor recipient would have any way to know that this had happened.

The recipient is not made aware of this change in encryption, while the sender is only notified if they have opted-in to encryption warnings in settings, and only after the messages have been re-sent. This re-encryption and rebroadcasting effectively allows WhatsApp to intercept and read users’ messages.

Although WhatsApp is based on the Signal protocol created by Open Whisper Systems, the same vulnerability does not exist in the Signal app, raising questions about how it came to be present in WhatsApp – and whether that was an oversight or a deliberate act.

[In Signal], if a recipient changes the security key while offline, for instance, a sent message will fail to be delivered and the sender will be notified of the change in security keys without automatically resending the message.

More worryingly still, when Boelter reported the issue to Facebook back in April of last year, he was told that it was ‘expected behaviour.’ The Guardian has verified that the backdoor still exists today.

With both US and UK governments able to intercept data from the entire population of their country, without any suspicion of criminal activity being required, privacy campaigners have said that the backdoor is a huge deal.

Professor Kirstie Ball, co-director and founder of the Centre for Research into Information, Surveillance and Privacy, called the existence of a backdoor within WhatsApp’s encryption “a gold mine for security agencies” and “a huge betrayal of user trust” […]

Jim Killock, executive director of Open Rights Group, said: “If companies claim to offer end-to-end encryption, they should come clean if it is found to be compromised – whether through deliberately installed backdoors or security flaws. In the UK, the Investigatory Powers Act means that technical capability notices could be used to compel companies to introduce flaws – which could leave people’s data vulnerable.”

Facebook refused to comment on whether it had used the backdoor to access messages, or whether any such access was performed at the request of government agencies. The company had already come under fire for collecting data from WhatsApp users after its acquisition of the service.

WhatsApp is commonly used by whistleblowers and campaigners in countries with poor records on human rights. Anyone concerned about the privacy of their messages would seem to be well advised to use iMessage or Signal instead of WhatsApp.

A much less serious vulnerability was previously discovered in WhatsApp, with the same issue present in iMessage, but that one would require either unlocked access to one of your devices, or access to your iCloud backup.


You can follow iPhoneFirmware.com on Twitter, add us to your circle on Google+ or like our Facebook page to keep yourself updated on all the latest from Apple and the Web.