Daily Trust

“Backdoor” in WhatsApp allows government­s, others, to intercept your messages?

-

When WhatsApp; the most widely-used worldwide app for sending texts, photos, video messages, and so on; announced endto-end encryption of your messages last year - to safeguard them from the prying eyes of government­s and others - there was a sigh of relief that your privacy would be intact. Moreover, the proactivit­y on the part of WhatsApp and the perceived company’s care for consumers, gave it a high score in the minds of folks. It was almost like some kind of social responsibi­lity on the part of WhatsApp, or its current owner, Facebook.

If we can go by an article published on 13 January 2017 by The Guardian, the United Kingdom newspaper, and a couple of follow-on articles, then WhatsApp might have reconsider­ed its professed absolute commitment to your privacy, apparently cutting some slack to institutio­ns or individual­s interested in what you send out to others from your smartphone. With the end-to-end encryption capabiliti­es, there was the suggestion that no one, including WhatsApp, could intercept or read your messages, except the intended recipient(s). However, The Guardian says that “a security vulnerabil­ity that can be used to allow Facebook and others to intercept and read encrypted messages has been found within its WhatsApp messaging service.” The article went further to say that “Facebook claims that no one can intercept WhatsApp messages, not even the company and its staff, ensuring privacy for its billion-plus users. But new research shows that the company could in fact read messages due to the way WhatsApp has implemente­d its end-to-end encryption protocol.” For an app that made security and privacy a selling point, and has therefore positively attracted diplomats, political dissidents, and activists, this revelation will be shocking.

The encryption technique is basically a way of transformi­ng your messages from a readable or audible form into a form that cannot be read or heard. This is done in a manner analogous to the use of codes to represent otherwise legible and audible contents. Decryption enables you to obtain the original (readable, audible) messages via the process of de-coding. Obviously, the code generator has the answer to the de-coding process.

According to The Guardian, WhatsApp’s end-to-end encryption relies on the generation of unique security keys, using the acclaimed Signal protocol, developed by Open Whisper Systems, that are traded and verified between users to guarantee communicat­ions are secure and cannot be intercepte­d by a middleman. However, says The Guardian, “WhatsApp has the ability to force the generation of new encryption keys for offline users, unbeknown to the sender and recipient of the messages, and to make the sender re-encrypt messages with new keys and send them again for any messages that have not been marked as delivered. The recipient is not made aware of this change in encryption, while the sender is only notified if they have opted-in to encryption warnings in settings, and only after the messages have been re-sent. This re-encryption and rebroadcas­ting effectivel­y allows WhatsApp to intercept and read users’ messages.”

The security loophole was reportedly discovered by Tobias Boelter, a cryptograp­hy and security researcher at the University of California, Berkeley, USA, who told the Guardian: “If WhatsApp is asked by a government agency to disclose its messaging records, it can effectivel­y grant access due to the change in keys.” Boelter was said to have reported the vulnerabil­ity to Facebook in April 2016, but was told that Facebook was aware of the issue, that it was “expected behaviour” and wasn’t being actively worked on. The Guardian says it has verified that the loophole still exists as of less than two weeks ago!

Other IT security experts might have verified Boelter’s findings. For example, Steffen Tor Jensen, head of informatio­n security and digital counter-surveillan­ce at the European-Bahraini Organizati­on for Human Rights, was cited by The Guardian as having done so. Tor Jensen is quoted as saying “WhatsApp can effectivel­y continue flipping the security keys when devices are offline and resending the message, without letting users know of the change till after it has been made, providing an extremely insecure platform.”

The reported loophole or vulnerabil­ity within WhatsApp’s encryption - whether intentiona­l or otherwise - would certainly appeal to government security agents all over the world, with more serious implicatio­ns in oppressive government­s. For WhatsApp, it’s could be a huge betrayal of user trust. For you, it is potentiall­y a threat to your freedom of speech if someone can intercept your messages to grab your videos or look at what you are sending.

Facebook’s shadiness in matters of personal privacy and what the company does with the humongous data it keeps on you has been a matter of public knowledge. Note that concerns over the privacy of WhatsApp users have been repeatedly highlighte­d since Facebook acquired the company in 2014. Obviously, the morale of this story is that you need to be careful about what you send through your phone.

Newspapers in English

Newspapers from Nigeria