※ 本文轉寄自 ptt.cc, 文章原始頁面
標題

[情報] Durov 針對 WhatsApp 再次被爆後門開嗆

時間
最新2019-11-22 00:43:00
留言34則留言,21人參與討論
推噓19 ( 19015 )
※ [本文轉錄自 Instant_Mess 看板 #1TrN-2uZ ] 稍早 Telegram 創辦人 Durov 又在他的個人頻道開嗆了,這邊簡單翻譯了一下: 今年五月,我預測 WhatsApp 將會繼續被爆出後門,嚴重的安全問題一個接著一個出現,就跟過往紀錄一樣 [1]。 這週新的後門又悄悄地被發現了 [2],就像前兩次被發現的後門, 這漏洞允許你手機上所有資料都讓黑客及政府探員看爽爽,只要發個影片給你,所有資料都落入攻擊者手中了 [3]。 In May, I predicted that backdoors in WhatsApp would keep getting discovered, and one serious security issue would follow another, as it did in the past [1]. This week a new backdoor was quietly found in WhatsApp [2]. Just like the previous WhatsApp backdoor and the one before it, this new backdoor made all data on your phone vulnerable to hackers and government agencies. All a hacker had to do was send you a video – and all your data was at the attacker’s mercy [3]. WhatsApp 不僅無法保護您的訊息安全,而且還一直作為特洛伊木馬來監視您 WhatsApp 外的照片和訊息。 他們為何這麼做?Facebook 在收購 WhatsApp 之前就已經成為美帝稜鏡計劃的一員 [4][5]。 要是覺得被收購後政策會轉彎就太天真了,尤其在 WhatsApp 創辦人承認「我賣了所有使用者的隱私」後 [6]。 WhatsApp doesn’t only fail to protect your WhatsApp messages – this app is being consistently used as a Trojan horse to spy on your non-WhatsApp photos and messages. Why would they do it? Facebook has been part of surveillance programs long before it acquired WhatsApp [4][5]. It is naive to think the company would change its policies after the acquisition, which has been made even more obvious by the WhatsApp founder’s admission regarding the sale of WhatsApp to Facebook: “I sold my users’ privacy” [6]. 在本週被爆出此後門後,Facebook 堅稱沒有黑客成功利用後門的證據,試圖使混淆民眾視聽 [7]。 當然沒所謂的證據啦,想取得證據的話,要先能分析 WhatsApp 使用者分享的影片, 然而這並不會永久保存在他的伺服器上(而是透過 Google 及 Apple 的伺服器傳送明碼的訊息及影片 [8])。 蒸蚌,都不用分析影響範圍了 - 沒證據?真方便 Following the discovery of this week’s backdoor, Facebook tried to confuse the public by claiming they had no evidence that the backdoor had been exploited by hackers [7]. Of course, they have no such evidence – in order to obtain it, they would need to be able to analyze videos shared by WhatsApp users, and WhatsApp doesn’t permanently store video files on its servers). So – nothing to analyze – “no evidence”. Convenient. 但請放心,這麼大的資安漏洞肯定早晚會被發現,就像之前用來反對人權運動及某些天真的記者一樣 [9][10]。 今年九月有報導指出這些透過漏洞取得的資料會分享給美國探員們 [11][12]。 But rest assured, a security vulnerability of this magnitude is bound to have been exploited – just like the previous WhatsApp backdoor had been used against human rights activists and journalists naive enough to be WhatsApp users [9][10]. It was reported in September that the data obtained as a result of the exploitation of such WhatsApp backdoors will now be shared with other countries by US agencies [11][12]. 儘管有愈來愈多的證據顯示 WhatsApp 是個釣個資的蜜罐(honeypot),專門騙那些到了 2019 仍相信 Facebook 的人, 但以善意推定來說,也可能只是不小心在所有程式都寫出了嚴重的資安漏洞。 我相信 Telegram 在整體複雜度跟 WhatsApp 相似,但推出六年以來沒有出過半個 WhatsApp 等級的紕漏。 非常不可能有人會不小心地犯下大型資安問題、常態性地為監控者開方便的小徑。 Despite this ever-increasing evidence of WhatsApp being a honeypot for people that still trust Facebook in 2019, it might also be the case that WhatsApp just accidentally implements critical security vulnerabilities across all their apps every few months. I doubt that – Telegram, a similar app in its complexity, hasn’t had any issues of WhatsApp-level severity in the six years since its launch. It’s very unlikely that anyone can accidentally commit major security errors, conveniently suitable for surveillance, on a regular basis. 無論 WhatsApp 母公司的內心意圖是什麼,對使用者的建議都一樣: 除非你覺得你所有照片、訊息有天全被赤裸裸的公開在網路上很酷,否則你該從手機中把 WhatsApp 刪了。 Regardless of the underlying intentions of WhatsApp’s parent company, the advice for their end-users is the same: unless you are cool with all your photos and messages becoming public one day, you should delete WhatsApp from your phone. 引用連結: [0] 此篇 Durov 頻道原文 https://t.me/durov/109 [1] 為何 WhatsApp 永遠不可能安全 https://tg.pe/Dx1 [2] WhatsApp 使用者急著更新程式以免監控威脅 https://tg.pe/Dx2 [3] WhatsApp 的 Android 及 iOS 使用者現正遭受有害影片的威脅 https://tg.pe/Dx3 [4] 關於稜鏡計劃你該知道的事 https://tg.pe/Dx4 [5] 美國 NSA 國安局從九大科技公司索取資料 https://tg.pe/Dx5 [6] WhatsApp 創辦人:我賣了所有使用者的隱私 https://tg.pe/Dx6 [7] 黑客可用 WhatsApp 處理影片的漏洞取得你手機控制權 https://tg.pe/Dx7 [8] WhatsApp 儲存未加密的備份資料在你的 Google Drive 雲端硬碟 https://tg.pe/Dx8 [9] 上百位使用 WhatsApp 的記者、異議人士遭駭 https://tg.pe/Dx9 [10] 獨家:各國政府官員的 WhatsApp 遭駭 https://tg.pe/DxA [11] 檢警可以透過美國當局取得嫌疑犯的 Facebook 及 WhatsApp 訊息 https://tg.pe/DxB [12] Facebook、WhatsApp 將與英國警察分享訊息資料 https://tg.pe/DxC 轉貼自 Telegram 頻道: https://t.me/SeanChannel/92 --- 好像沒聽說 LINE 被嘴成這樣,是外國人不屑台日韓市場嗎 -- ※ 發信站: 批踢踢實業坊(ptt.cc), 來自: 140.113.231.99 (臺灣) ※ 文章網址: https://www.ptt.cc/bbs/Instant_Mess/M.1574272898.A.E23.html

34 則留言

※ 轉錄者: Sean64 (140.113.231.99 臺灣), 11/21/2019 02:04:23
※ 編輯: Sean64 (140.113.231.99 臺灣), 11/21/2019 02:14:40

kai08130623, 1F
因為Line不是通訊軟體啊…黑客進去說不定也找不到

kai08130623, 2F
對話紀錄

befdawn, 3F
Telegram 讚

aq981334, 4F
LINE不是廣告APP嗎?通訊只是附加的

leechiungyi, 5F
謝翻譯,但台灣telegram使用者真的太少了,line的爛

leechiungyi, 6F
備份目前還是輸給wapp啊,還好我沒有裸照習慣?

leechiungyi, 7F
ps菱鏡計畫不知道可以去看一下電影,但難聽一點,寧

leechiungyi, 8F
可給美帝監控也比中共那種第三世界好吧

weepingkito, 9F
駭進去line要先繞過一堆廣告跟篩掉一堆官方帳號推播

weepingkito, 10F
才能找到對話紀錄

birdy590, 11F
應該沒人用 whatsapp 在傳什麼秘密的東西

birdy590, 12F
現在還在扯稜鏡計劃其實很可笑 那其實是個監聽計畫

birdy590, 13F
只是沒有正式的法律授權而已

birdy590, 14F
如果可以監聽 還需要 security hole 做啥?

EthereumPTT, 15F
line有廣告遮蔽法 讓駭客只找的到一堆廣告 這樣就

EthereumPTT, 16F
可以保護用戶了

EthereumPTT, 17F
但後來我身為勇者決定使用telegram自行放棄廣告的

EthereumPTT, 18F
保護

R4L, 19F
說個笑話 微信最安全

tofukingkion, 20F
給中國監控連看個卡通都不行XDDD

Toy17, 21F
拜託駭客去盜糞line的對話紀錄

spfy, 22F
Line對他來說應該就是一堆雜魚IM裡比較大的一條

hakuoro, 23F
批華為這嫌疑犯卻捧FB這前科慣犯 這邏輯也很可笑

longkiss0618, 24F
論文等級 厲害

qooxxp, 25F
Line的對話紀錄連本人都不一定能找齊了...

eric525498, 26F
推 Telegram

henry8168, 27F
推 TG

goldie, 28F
推 Telegram

goldie, 29F
幫補原文位址https://t.me/durov/109

pemit, 30F
推TG

luis1056379, 31F
要在line要找到實用的資訊不如去破解telegram

Toy17, 32F
結果今天TG伺服器超廢…

zero11995, 33F

soto2080, 34F
Telegram真的很讚