Hacker News new | past | comments | ask | show | jobs | submit login
[dupe] WhatsApp Just Switched on Encryption for a Billion People (wired.com)
162 points by uptown on April 5, 2016 | hide | past | favorite | 59 comments




> The encryption genie is out of the bottle

> There was a middle period where the government had a broad ability to surveil, but if you look at human history in total, people evolved and civilizations evolved with private conversations and private speech. If anything, we’re bringing that back to individuals.

I think on the contrary, the surveillance demon is out of the bottle. It's too hard to hide metadata such as ip addresses in communications; in many places Tor is blocked, browsers can be fingerprinted, typing style and writing style can be identified by statistical methods; we depend on auto-updated operating systems that might be backdoored in the future or are already backdoored and even if we have an "untraceable" system, we can't possibly use our old accounts were we logged in with our real name, or using our real IP address in the past. So, anonymous web use is not as social as plain web use. Besides, we already leak too much data through our GSM phones, at least to the carrier and the state agencies that log the user data.


There is no reason why we can't create an entire new computing paradigm that does respect our historic conventions around privacy though.

I gave a talk about such conversational languages [1] at ClojureD last month if you're interested...

[1] https://www.youtube.com/watch?v=CD-Dtr9j0f4


Social network graphs are also a huge surveillance leak. If you use an otherwise anonymous way to talk to all your friends, and someone knows who those friends are, they have a pretty good idea who owns that "anonymous" communication channel.

This is tragic, since the most interesting and private uses of the internet are in interacting with friends, family, and loved ones.


So now WhatsApp is finally on par with iMessage and Signal, and shares the same weakness: public key distribution. Key distribution is controlled by a centralized server that could, for malicious or other reasons, send you new fake keys for people you communicate with. For iMessage, this is explained in this 2015 post by Matthew Green:

http://blog.cryptographyengineering.com/2015/09/lets-talk-ab...

At least with Signal you can compile your own client (though that doesn't help if the server is going to send you fake public keys!).


If you go to Settings -> Account -> Security, you can enable the option that will notify you in case the key changes.

You do have to trust the client and opt in, but the feature exists.


You're right. So when you get a notification of a key change (for malicious or other reasons) it is up to you to verify that the user did indeed have a key change — preferably out of band, or at least over another medium.


Is there no UI notifying you that a user's keys have changed in Signal? If so, the central server would need to send compromised keys on day 1, which would be detectable when you check the key signature.


There is a UI. It doesn't even show (decrypt) the new messages until you add the new key.


Whisper System's announcement of this: https://whispersystems.org/blog/whatsapp-complete/


> This includes chats, group chats, attachments, voice notes, and voice calls across Android, iPhone, Windows Phone, Nokia S40, Nokia S60, Blackberry, and BB10.

Wow. I'm genuinely impressed. The Nokia app store closed over two years ago, and they still implemented this for those old, trusty devices. That's some dedication for serving the users!


and whatsapp https://blog.whatsapp.com/10000618/End-to-end-encryption (from the other hn thread)


>And that’s true on any phone that runs the app, from iPhones to Android phones to Windows phones to old school Nokia flip phones.

Woo! Props to the WhatsApp team for supporting these features for dumbphone users like me.

Does anyone know if/how/where you can verify a users fingerprint?


At least on smartphones yes, you can (by tapping on persons name during chat, and then selecting "Encryption").


I meant on S40.


Hazzah, you can! Shame they're only supporting s40 through the end of '16 :(


> WhatsApp has no way of complying with a court order demanding access to the content of any message, phone call, photo, or video traveling through its service

Unless the NSA/FBI/CIA secretly orders WhatApp to release compromised app update with a backdoor.


It's only a matter of time


The article says: "With end-to-end encryption in place, not even WhatsApp’s employees can read the data that’s sent across its network."

But according to the diagram: http://www.wired.com/wp-content/uploads/2016/04/Whatsapp_Enc...

... A's message is encrypted with Whatsapp's public key, which means that Whatsapp's private key can (and has to) decrypt it on the server side to encrypt it in turn with B's public key.

If the diagram is truthful, the claims the article makes are incorrect.


Why are people downvoting this? While the "public key" is not "WhatsApp's" it is served from their server hence in theory they can provide you with any public key they want, decrypt the message, store it, and re-encrypt it with the "correct" private key and send it off to the user.

With PKI the ability of the user to verify that they received and used the correct public key is critical and while I have to admit that I haven't read that much about WhatsApp's E2EE setup I haven't seen anything that shows how this issue can be mitigated in a way that would be useful for most users.


I see your concern, but I think the issue they're trying to prevent is authorities coming with a court order wanting to decrypt messages after the fact.

If WhatsApp decides to act malicious, yes, this method would make it very easy for them.


That's true, but they provide means to verify the fingerprint of the other party, so you can verify that your app is encrypting messages using legitimate public key and that there's no MITM going on.


Yeah but again there are quite a few questions here (not an WA user).

How foolproof is the verification system, how susceptible is it to downgrade attacks (while E2EE isn't not universally deployed) is there are 3d party verification of signatures, is there a community trust signing, can whats app disable E2EE in it's application without a noticeable UX change to either party, how does this work with multi user messages, how does this work with multiple devices, how does this work with historic messages that were encrypted using different keys etc.

I would say that there are sufficient "unknowns" at this point to take the security of this entire solution with some skepticism especially if you remotely planning to use this for anything that could put your life at any risk.


Downgrade attacks should be difficult. As the article mentions once a client has communicated with another once using encryption all future communications to that client will be encrypted. So a downgrade attack would require either spoofing a new client for a user (eg a phone they didn't have before) which is likely noticeable.

The whitepaper (https://www.whatsapp.com/security/WhatsApp-Security-Whitepap...) goes into more detail.

That said, they could push out an update that changes the UI to disable E2EE without notifying the user, and that would be difficult to notice since the app is closed source. For this reason Signal is more secure, despite using the exact same protocol.


What in the diagram gives you the impression the public key belongs to WhatsApp? Presumably WhatsApp is handling PKI.


"Public key from server" is an ambiguous phrase. I took "from" to denote possession, not source.

After reading the other sources of information, it's clear it is a secure protocol. More so when designed by the Snowden-approved Open Whisper Systems team.


It's the user's public key, not WhatsApp's.


The message is encrypted with the public key belonging to user B.


Actually, it's the private key that needs to be kept secret... I'm not sure how that's guaranteed or how we can actually verify that the private key is secure. Knowing that whatsapp is built by spying and uploading all your contacts and phone numbers to their servers, well, do you trust them to not upload the private key also?


it use the public key of the other user, not whatsapp. in effect, whatsapp is just acting as a key server. now they could have that users private key, but that's another matter


So in theory they could help by intercepting these keys and handing them to authorities without actually decryption the data themselves


the client generates a public/private key pair and only sends the public one to the whatsapp server. the server should never be able to access the private key. but unless the source of the client is available for review, who knows?


My understanding of this situation is that, previously, E2E encryption was enabled between Android clients[1]. Now, it is claimed that all clients, for all media types, do it.

1. http://www.wired.com/2014/11/whatsapp-encrypted-messaging/


My question is, how can this be verified?


They have released a whitepaper [1] where they go into details of how the encryption works, so using this knowledge in theory one should be able to verify that the encryption is legitimate.

[1] https://www.whatsapp.com/security/WhatsApp-Security-Whitepap...


Nice! Thank you


Watch the traffic go by with a packet sniffer? Verifying that it is done securely is a lot harder, but you can at least verify that things are not being sent as plain text/data.


Watching traffic is irrelevant, the encryption of the transport (WhatsUp always used TLS for that) is not in question here, this is about end to end encryption and if WhatsUp can either decrypt the data for users or switch them off E2EE at any point without it being noticeable to either end.


Yeah but that just shows its https.


Can't you MITM yourself fairly easily to decrypt the https and see what's being passed? Assuming you have full control of your device.


>“The encryption genie is out of the bottle” ... > There was a middle period where the government had a broad ability to surveil, but if you look at human history in total, people evolved and civilizations evolved with private conversations and private speech. If anything, we’re bringing that back to individuals.

I think on the contrary, the surveillance demon is out of the bottle. It's impossible to hide metadata (ip addresses) in communications, we depend on auto-updated operating systems that might be backdoored in the future or are already backdoored and even if we have an "untraceable" system, we can't possibly use our old accounts were we logged in with our real name, or which can be traced to our IP address.


delete your dupe to revive some karma


I can't believe that no one ever mentions Signal in any of these articles.


I'd like to know how backing up data on Google Drive will be done now. Does it remain encrypted, so that when you re-import it to your phone only then it'll be readable?


So, now we have a billion people who think they're communications are secure, as opposed to just encrypted.


Are you implying WhatsApp designed an insecure encryption?


how do you know it's secure other than what you read from the press release?


I have no idea how secure it is, I was asking for clarification.

Side note, I noticed your account is still green and 13 days old. Are new accounts green only for two weeks?


Bravo to moxie, and the WhatsApp guys actually sound really cool. So, assuming you're using WhatsApp Web, does that mean you have end-to-end encryption there too? I recall the web version used your phone somehow.


Apparently it does. I just opened whatsapp web and it greeted me with a message that any messages and calls through it are now encrypted.


Looks great, but I find it a bit weird that there's no Whatsapp announcement - I also wonder if it'll slow down the ability to have the same whatsapp account on multiple devices.



How does this compare with Telegram? Same, better or worse?


Basically Telegram is _nothing_ compared to this.


Really? How so? I can understand from scale perspective, but is it more secure than Telegram?


Telegram received quite a backlash from crypto community for rolling out nonsensical throw-a-bunch-of-crypto-algorithms-together homebrew protocol that was designed by Math PhD™ students and having an audacity of conducting a contest to break it.

This OTOH uses peer reviewed, strong, modern crypto that was designed by people who know how to do these things.


The crypto might be superior, but we do not know for sure that Whatsapp/Facebook is not covertly decrypting the messages and funneling through some Prism v2 NSA surveillance operation.


You can say say the same about Telegram, can you not?


Did they roll this out to their Mainland Chinese users?




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: