https://www.youtube.com/watch?v=B9Syj555RQc
UNPATCHED "Design Flaw" in E2E encryption apps tracks EVERYTHING you do
End to end encrypted messaging apps, such as WhatsApp and Signal, have a shocking, high severity unpatched side channel vulnerability, that can be exploited by any government, intelligence agency, law enforcement agency, and even private company or individual person, the ability to build a complete profile on you, including what devices you use, how long you use them for, who you're communicating with, your daily sleeping habits, working habits, when you physically move, when you're at home, when your on Wi-Fi vs cellular data, the exact times and durations of when you make phone calls, and so much more, without knowing anything other than your phone number. Whether you're a pen tester, security researcher, or cyber security expert, I hope you'll find this attack as fascinating as I did.
Official Source:
https://arxiv.org/pdf/2411.11194
0:00 โ Overview
1:53 - End-to-end encryption background
3:21 โ Multi-device support
6:31 โ Message delivery & receipts
8:03 โ Attack vector
10:42 โ Timing side-channel
11:35 โ Video demo
12:23 โ Severe information leaks
15:57 โ Solutions and implications
17:36โ Can you do anything yourself?
18:18 - Very interesting personal finding + demo