![]() |
![]() |
#1 |
"James Prescott Curry"
Oct 2019
Jupiter FL 33458
1002 Posts |
![]()
Saw this in the news today:
https://www.silicon.co.uk/mobility/m...arrests-346164 and BBC article states, "Nikki Holland, NCA director of investigations, said the operational team had described it "as akin to cracking the enigma code". https://www.bbc.com/news/uk-53263310 It appears that the platform used RSA and AES and other algorithms, but details unclear from open sources online. So, if they did crack the algorithm, then a revolutionary breakthrough has occurred? Any chatter out there? |
![]() |
![]() |
![]() |
#2 |
Undefined
"The unspeakable one"
Jun 2006
My evil lair
607910 Posts |
![]()
The service protocol was hacked by police with a MITM device. Nothing new to see here. When discussing your criminal activities with people don't use insecure services that don't have E2E encryption, right?
The algorithms were not compromised. Unless it is ruse to pretend they can't crack AES but secretly can. I find that unlikely. |
![]() |
![]() |
![]() |
#3 |
"James Prescott Curry"
Oct 2019
Jupiter FL 33458
22 Posts |
![]()
My sense is that you are correct. From what I read online about the platform, however, it was robust and E2E. The MITM device intercepted the encrypted comms, and then what? Maybe they captured keys somehow on HSM on devices?
|
![]() |
![]() |
![]() |
#4 | |
Undefined
"The unspeakable one"
Jun 2006
My evil lair
6,079 Posts |
![]() Quote:
My guess is the client simply trusted the destination. So for A talking to B, the MITM will provide a key to A and say "Hi, I'm B", and A trusted it without verifying it was talking to the correct destination. |
|
![]() |
![]() |
![]() |
#5 | ||
"James Prescott Curry"
Oct 2019
Jupiter FL 33458
22 Posts |
![]() Quote:
Quote:
Maybe the authorities will publish a report on the architecture and what they did, but doubtful, unless researchers get interested. |
||
![]() |
![]() |
![]() |
#6 | |
Undefined
"The unspeakable one"
Jun 2006
My evil lair
6,079 Posts |
![]() Quote:
|
|
![]() |
![]() |
![]() |
#7 | |
Bamboozled!
"πΊππ·π·π"
May 2003
Down not across
3·3,529 Posts |
![]() Quote:
Far more likely is exploitation of implementation weakness coupled with traffic analysis and infiltration of the user base. Classical espionage, in other words. IMO, anyway. |
|
![]() |
![]() |
![]() |
#8 | |
Bamboozled!
"πΊππ·π·π"
May 2003
Down not across
3·3,529 Posts |
![]() Quote:
https://www.vice.com/en_us/article/3...crochat-hacked has much more detail. |
|
![]() |
![]() |
![]() |
#9 | |
Undefined
"The unspeakable one"
Jun 2006
My evil lair
6,079 Posts |
![]() Quote:
So the question remains how was the malware installed? A compromised server delivering an-important-security-update? Which would just prove the point once you have a working system don't blindly "fix" it with updates. |
|
![]() |
![]() |
![]() |
#10 | ||
Bamboozled!
"πΊππ·π·π"
May 2003
Down not across
3×3,529 Posts |
![]() Quote:
Quote:
It is, of course, possible that there was an important security flaw which needed fixing. |
||
![]() |
![]() |
![]() |
#11 | |
Nov 2003
746010 Posts |
![]() Quote:
Perhaps I should hire myself out....... I could probably make big bucks. Last fiddled with by R.D. Silverman on 2020-07-03 at 13:38 |
|
![]() |
![]() |
![]() |
Thread Tools | |
![]() |
||||
Thread | Thread Starter | Forum | Replies | Last Post |
Why integer factorization is in P/FP? | tetramur | Factoring | 4 | 2019-01-23 20:51 |
hardware breakthrough : 1 atom-large transistor | firejuggler | Hardware | 3 | 2012-02-24 15:15 |
Integer factorization? | bearnol2 | Information & Answers | 7 | 2010-12-09 02:50 |
Integer factorization with q < 2p | mgb | Math | 36 | 2009-11-07 15:59 |
Integer Factorization | mgb | Math | 16 | 2007-12-17 10:43 |