Tarkan Y
2017-06-02 12:12:22 UTC
Hi all,
In my master thesis I did a security check of the Signal protocol. Among other things, I executed replay attacks on an active Signal session with the help of a tool called Fiddler. I have found a problematic case and would like to suggest enhancements (see attachments): I found that the error message in the Signal app is potentially misleading when a replay attack occurs.
You can see my idea attached.
Compared to the Telegram Chrome Extension I am missing some settings:
Set additional
password
Active Sessions
Email-Login
My suggestion (especially for the Chrome Extension) is that the user gets noticed of hacking attempts. Instead of a internal error like Bad MAC, the user should be informed about the following things:
Active Sessions:
IP Address
Location
Platform
Device
Thank you for your attention!
Tarkan Yavas
M. Eng.
Beuth University of applied sciences Berlin
In my master thesis I did a security check of the Signal protocol. Among other things, I executed replay attacks on an active Signal session with the help of a tool called Fiddler. I have found a problematic case and would like to suggest enhancements (see attachments): I found that the error message in the Signal app is potentially misleading when a replay attack occurs.
You can see my idea attached.
Compared to the Telegram Chrome Extension I am missing some settings:
Set additional
password
Active Sessions
Email-Login
My suggestion (especially for the Chrome Extension) is that the user gets noticed of hacking attempts. Instead of a internal error like Bad MAC, the user should be informed about the following things:
Active Sessions:
IP Address
Location
Platform
Device
Thank you for your attention!
Tarkan Yavas
M. Eng.
Beuth University of applied sciences Berlin