Your data. Your choice.

If you select «Essential cookies only», we’ll use cookies and similar technologies to collect information about your device and how you use our website. We need this information to allow you to log in securely and use basic functions such as the shopping cart.

By accepting all cookies, you’re allowing us to use this data to show you personalised offers, improve our website, and display targeted adverts on our website and on other websites or apps. Some data may also be shared with third parties and advertising partners as part of this process.

Background information

WhatsApp security vulnerability - The inventor talks about "fundamental problem of cryptography"

Dominik Bärlocher
16.1.2017
Translation: machine translated

Does WhatsApp have a vulnerability or not? The answer: Yes and no. Because the vulnerability from last weekend is one that penetrates deep into the problems of cryptography in everyday life. The cryptographer behind the encryption explains.

The backdoor that isn't supposed to be one

Marlinspike spoke out in a blog post on Whispersystems.org shortly after it went viral in the media. Under the title "There is no WhatsApp backdoor", he says that the Boelters exploit works and that it is expected behaviour, but that this is not a vulnerability per se. Rather, it is two problems of cryptography colliding.

  1. In normal everyday operation of the app, it is always possible for a key to change
  2. Security and convenience clash at certain points. When this happens, a developer has to decide what their application should do

In order to understand the blog post, you may need an explanation of what a "man in the middle" attack is. In short: Web traffic that is actually private is routed via third-party infrastructure where it is intercepted. In practice, it looks like this:

WhatsApp could try to "man in the middle" a conversation, just like with any encrypted communication system, but they would risk getting caught by users who verify keys.

German: WhatsApp could try a man in the middle attack on a conversation, just like with any encrypted communication system. But they would risk being caught by users verifying their keys.

What the vulnerability cannot do

The vulnerability described in my previous article and discovered by Tobias Boelter works, even if it relies on users not taking care of the encryption of the chat. Nevertheless, it comes with its limitations:

The WhatsApp clients have been carefully designed so that they will not re-encrypt messages that have already been delivered. Once the sending client displays a "double check mark," it can no longer be asked to re-send that message.

The WhatsApp clients have been carefully designed so that they do not re-encrypt messages that have already been received. As soon as the two tick marks are displayed on the sender's client, they can no longer be asked to resend the message.

Only semantically, Marlinspike argues that the backdoor reported by Boelters is not a backdoor. Nevertheless, anyone with access to WhatsApp's server can listen in on all future messages. However, past conversations cannot be read. So, backdoor functionality is present, even if it was not planned that way.

The attacker - in this case the main concern is the so-called three letter agencies in the scene, i.e. FBI, NSA, CIA, etc. - is therefore only able to read current and future messages.

Why Signal

In the comments to the previous article, I was repeatedly asked about other messengers. It would take far too long to answer each question individually. Nevertheless, it is important to me that you understand why I recommend Signal and not Threema, Wire or Telegram.

Ferner uses signal infrastructure that you already own. You don't get another key or another ID, but your phone number. This is particularly important for one of Signal's best features: SMS fallback. An example:

  • I use Signal
  • My girlfriend doesn't
  • I write her a message on Signal
  • The Signal server notices this before the message is sent
  • The signal server rejects the message
  • The message is sent as an SMS

Because Signal wants everyone to use Signal, a message pops up on my screen giving me the option to send an SMS to my girlfriend and invite her to Signal. Even if she doesn't choose Signal, she knows a bit more about encryption.

You may not agree with my reasoning and that's okay. Because then you've done something that I advise all users to do: you've thought about encryption, compared products and made a conscious decision. And that's more than some people do. Take your knowledge, your curiosity and your critical reflection out into the world. Question everything that is loaded onto your phone and stay safe.

You might also be interested in this

28 people like this article


User Avatar
User Avatar

Journalist. Author. Hacker. A storyteller searching for boundaries, secrets and taboos – putting the world to paper. Not because I can but because I can’t not.


Background information

Interesting facts about products, behind-the-scenes looks at manufacturers and deep-dives on interesting people.

Show all