4.9 • 696 Ratings
🗓️ 9 August 2018
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Thursday, August 9th, 2018 edition of the Sands Internet Storm Center's Stormcast. |
0:07.8 | My name is Johannes Ulrich, and today I'm recording from San Antonio, Texas. |
0:12.9 | The HomeProject, which is a very popular project that allows users of OS10 and Mac OS to install various open source packages on their Mac, |
0:25.4 | has had a security incident that allowed a researcher to essentially push arbitrary code to the repository, |
0:33.5 | which would then have been made live by users as they updated their install of |
0:40.8 | home proof. The root cause here was a GitHub token that was left exposed as part of |
0:47.4 | a publicly accessible Jenkins install. Now the HomePro project has reacted to the report of this researcher and has further |
0:57.5 | enhanced their own security precautions. Probably the most meaningful change that HomePro |
1:03.1 | made was to enable branch protection. What this does is that it no longer allows developers |
1:08.8 | to automatically merge code. Instead, all changes have to be approved first |
1:16.6 | and Checkpoint took a closer look at WhatsApp and how it actually works under the hood and came up with three different quite interesting |
1:29.4 | vulnerabilities in the application. |
1:37.0 | Now, one special feature of WhatsApp is end-to-end encryption, not even WhatsApp itself. |
1:42.0 | The company is able to access any messages sent via its platform. |
1:45.0 | So in order to inspect these messages, Checkpoint actually first had to get past the encryption. |
1:48.0 | Now, this is of course not impossible if you are the endpoint, |
1:53.0 | and that's exactly sort of what Checkpoint did here. |
1:57.0 | They observed the initial key exchange, |
1:59.0 | which involves scanning a QR code from the WhatsApp website, |
2:04.9 | and by doing so, they were able to obtain the encryption keys for their account. So nothing really |
2:11.6 | broken at this point. They were now just able to inspect their own messages and actually see how WhatsApp works. |
2:20.4 | WhatsApp uses protocol buffers for serialization. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.