<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Whatsapp Archives - DIGITAL SELF-DEFENSE</title>
	<atom:link href="https://www.digitalnisebeobrana.cz/en/tag/whatsapp/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.digitalnisebeobrana.cz/en/tag/whatsapp/</link>
	<description></description>
	<lastBuildDate>Wed, 15 May 2019 12:54:54 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.6.2</generator>

<image>
	<url>https://www.digitalnisebeobrana.cz/wp-content/uploads/2018/12/cropped-mr.black_-32x32.png</url>
	<title>Whatsapp Archives - DIGITAL SELF-DEFENSE</title>
	<link>https://www.digitalnisebeobrana.cz/en/tag/whatsapp/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>0-day vulnerability in WhatsApp</title>
		<link>https://www.digitalnisebeobrana.cz/en/0-day-zranitelnost-ve-whatsapp/</link>
		
		<dc:creator><![CDATA[Milan]]></dc:creator>
		<pubDate>Wed, 15 May 2019 12:49:02 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Rychlé novinky]]></category>
		<category><![CDATA[Techniky hackerů]]></category>
		<category><![CDATA[0-day]]></category>
		<category><![CDATA[šifrování]]></category>
		<category><![CDATA[Signal]]></category>
		<category><![CDATA[Whatsapp]]></category>
		<guid isPermaLink="false">https://www.zaskolit.cz/?p=1478</guid>

					<description><![CDATA[<p>WhatsApp (owned by Facebook) has released an update that patches the vulnerability that allowed attackers to install malicious software. While WhatsApp is end-to-end encrypted, an attacker could access messages by infecting an end device (phone) on which messages are normally visible. In addition, an attacker did not have to rely on a faulty user step &#8230;<br /><a href="https://www.digitalnisebeobrana.cz/en/0-day-zranitelnost-ve-whatsapp/" class="more-link pen_button pen_element_default pen_icon_arrow_double">Continue reading <span class="screen-reader-text">0-day vulnerability in WhatsApp</span></a></p>
<p>The post <a href="https://www.digitalnisebeobrana.cz/en/0-day-zranitelnost-ve-whatsapp/">0-day vulnerability in WhatsApp</a> appeared first on <a href="https://www.digitalnisebeobrana.cz/en">DIGITAL SELF-DEFENSE</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>WhatsApp (owned by Facebook) has released an update that patches the vulnerability that allowed attackers to install malicious software.<span id="more-1478"></span></p>
<p>While WhatsApp is <a href="https://www.zaskolit.cz/en/sifrovani-zprav-demo/">end-to-end encrypted</a>, an attacker could access messages by infecting an end device (phone) on which messages are normally visible.</p>
<h4>In addition, an attacker did not have to rely on a faulty user step (such as clicking a link or opening an attachment), the software installation took place after an attacker start WhatsApp call. The user did not even have to accept the call, the malicious code already contained that call.<br />
The call record could then be erased so that the user would not normally be able to determine whether he / she had been the victim of such an attack.<br />
As mentioned above, the bug is already fixed, so it is highly recommended to upgrade to the latest version of WhatsApp.<br />
Or just go to a safer <a href="https://www.signal.org">Signal Messenger</a> <img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></h4>
<h4></h4>
<h4>Vulnerable Versions:</h4>
<p><strong>Android</strong>: v2.19.134 and lower, WhatsApp Bussines v2.19.44 and lower<br />
<strong>iOS</strong>: v2.19.51 and lower, WhatsApp Business v2.19.51 and lower<br />
<strong>Windows Phone</strong>: v2.18.348 and lower<br />
<strong>Tizen</strong>: v2.18.15 and lower</p>
<h4>How to update WhatsApp?</h4>
<p><strong>Android</strong>:</p>
<ul>
<li>Open Google PlayOpen the menu in the upper left menu</li>
<li>Open My Apps and Games</li>
<li>If WhatsApp was not automatically updated, the &#8220;Update&#8221; button is available. Otherwise, the update menu is missing, only the button to open is used instead.</li>
</ul>
<p><strong>iOS</strong>:</p>
<ul>
<li>Open the App Store</li>
<li>Click &#8220;Update&#8221; at the bottom of the display</li>
<li>If WhatsApp was not automatically updated, the &#8220;Update&#8221; button is available. Otherwise, the update menu is missing, only the button to open is used instead</li>
</ul>
<p>The post <a href="https://www.digitalnisebeobrana.cz/en/0-day-zranitelnost-ve-whatsapp/">0-day vulnerability in WhatsApp</a> appeared first on <a href="https://www.digitalnisebeobrana.cz/en">DIGITAL SELF-DEFENSE</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Message encryption &#8211; demo</title>
		<link>https://www.digitalnisebeobrana.cz/en/sifrovani-zprav-demo/</link>
		
		<dc:creator><![CDATA[Milan]]></dc:creator>
		<pubDate>Thu, 13 Dec 2018 12:54:40 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[nástroje]]></category>
		<category><![CDATA[video]]></category>
		<category><![CDATA[email]]></category>
		<category><![CDATA[nástroj]]></category>
		<category><![CDATA[šifrování]]></category>
		<category><![CDATA[Signal]]></category>
		<category><![CDATA[Whatsapp]]></category>
		<guid isPermaLink="false">https://www.zaskolit.cz/?p=1225</guid>

					<description><![CDATA[<p>Plain (email) Client to Server (Facebook Messenger, Gmail) End to end (Signal, Threema, Wire) You Hello there! Send Key: Transfer to server (internet): Hacker Server: AdminPolice Transfer to receiver (internet): Hacker Receiver: Key:</p>
<p>The post <a href="https://www.digitalnisebeobrana.cz/en/sifrovani-zprav-demo/">Message encryption &#8211; demo</a> appeared first on <a href="https://www.digitalnisebeobrana.cz/en">DIGITAL SELF-DEFENSE</a>.</p>
]]></description>
										<content:encoded><![CDATA[<style>
    /* DivTable.com */
    .divTable{ display: table; }
    .divTableRow { display: table-row; }
    .divTableCell, .divTableHead { 
    	display: table-cell;
    }
    //.divTableBody { display: table-row-group;}
    .enc-display {
    	color: black;
    	background-color: lightgreen;
    	font-weight: bold;
    }
#cellNone {
        background-color: wheat;
        border: solid white;
        padding: .5em;
}
#cellC2s {
        background-color: lightgrey;
        border: solid white;
        padding: .5em;
}
#cellE2e {
    	background-color: lightgreen;
        border: solid white;
        padding: .5em;
}
.enc-button {
  background-color: green;
  color: white;
  font-weight: bold;
  padding: .5em;
}
#tr1,#tr2 {
    	background-color: wheat;
    }
    #key1, #key2 {	
    }
.enc-hacker {
  background:url(https://www.zaskolit.cz/wp-content/uploads/2018/12/hacker_sees.png) no-repeat top left;
  background:url(https://www.zaskolit.cz/wp-content/uploads/2018/12/hacker_blind.png) no-repeat top left;
  background-size: 100% 100%;
  display: inline-block;
height: 95px;
width: 125px;
}
#enc-admin {
  background:url(https://www.zaskolit.cz/wp-content/uploads/2018/12/admin_sees.png) no-repeat top left;
  background:url(https://www.zaskolit.cz/wp-content/uploads/2018/12/admin_blind.png) no-repeat top left;
  background-size: 100% 100%;
  display: inline-block;
  height: 95px;
  width: 125px;
}
#enc-police {
  background:url(https://www.zaskolit.cz/wp-content/uploads/2018/12/police_sees.png) no-repeat top left;
  background:url(https://www.zaskolit.cz/wp-content/uploads/2018/12/police_blind.png) no-repeat top left;
  background-size: 100% 100%;
  display: inline-block;
  height: 95px;
  width: 125px;
}
.hidden {
  visibility: hidden;
}
</style>
<p><script type="text/javascript">
    function simpleCopy() {
           document.getElementById("key1").style.visibility="visible";
           document.getElementById("key2").style.visibility="visible";
           var mode = document.querySelector('input[name="encryption"]:checked').value; 
        console.log("Mode: ", mode); 
           var text = document.getElementById("sender").value;
           var dest = document.getElementById("receiver");
           switch(mode) {
              case "c2s":
                 c2s(text);
                 break;
              case "e2e":
        	 e2e(text);
                 break;
              default:
                 none(text);
                 break;
        } 
        } 
        function none(text) {
        console.log("fn: none");
           document.getElementById("tr1").value = text;
           document.getElementById("server").value = text;
           document.getElementById("tr2").value = text;
           document.getElementById("receiver").value = text;
           document.getElementById("key1").value = "";
           document.getElementById("key2").value = "";
           document.getElementById("enc-hacker1").style.backgroundImage = "url(https://www.zaskolit.cz/wp-content/uploads/2018/12/hacker_sees.png)";
           document.getElementById("enc-hacker2").style.backgroundImage = "url(https://www.zaskolit.cz/wp-content/uploads/2018/12/hacker_sees.png)";
           document.getElementById("enc-admin").style.backgroundImage = "url(https://www.zaskolit.cz/wp-content/uploads/2018/12/admin_sees.png)";
           document.getElementById("enc-police").style.backgroundImage = "url(https://www.zaskolit.cz/wp-content/uploads/2018/12/police_sees.png)";
           document.getElementById("key1").style.visibility="hidden";
           document.getElementById("key2").style.visibility="hidden";
        }   
        function c2s(text) {
           var key1 = keyGen();
           var key2 = keyGen();
           var encr1 = encrypt(text, key1);
           var srv = decrypt(encr1, key1);
           var encr2 = encrypt(srv, key2);
           var recv = decrypt(encr2, key2);
           document.getElementById("tr1").value = encr1;
           document.getElementById("server").value = srv;
           document.getElementById("tr2").value = encr2;
           document.getElementById("receiver").value = recv;
           document.getElementById("key1").value = key1;
           document.getElementById("key2").value = key2;
           document.getElementById("enc-hacker1").style.backgroundImage = "url(https://www.zaskolit.cz/wp-content/uploads/2018/12/hacker_blind.png)";
           document.getElementById("enc-hacker2").style.backgroundImage = "url(https://www.zaskolit.cz/wp-content/uploads/2018/12/hacker_blind.png)";
           document.getElementById("enc-admin").style.backgroundImage = "url(https://www.zaskolit.cz/wp-content/uploads/2018/12/admin_sees.png)";
           document.getElementById("enc-police").style.backgroundImage = "url(https://www.zaskolit.cz/wp-content/uploads/2018/12/police_sees.png)";
        }
        function e2e(text) {   
           var key1 = keyGen();
           var encr1 = encrypt(text, key1);
           var recv = decrypt(encr1, key1);
           document.getElementById("tr1").value = encr1;
           document.getElementById("server").value = encr1;
           document.getElementById("tr2").value = encr1;
           document.getElementById("receiver").value = recv;
           document.getElementById("key1").value = key1;
           document.getElementById("key2").value = key1;
           document.getElementById("enc-hacker1").style.backgroundImage = "url(https://www.zaskolit.cz/wp-content/uploads/2018/12/hacker_blind.png)";
           document.getElementById("enc-hacker2").style.backgroundImage = "url(https://www.zaskolit.cz/wp-content/uploads/2018/12/hacker_blind.png)";
           document.getElementById("enc-admin").style.backgroundImage = "url(https://www.zaskolit.cz/wp-content/uploads/2018/12/admin_blind.png)";
           document.getElementById("enc-police").style.backgroundImage = "url(https://www.zaskolit.cz/wp-content/uploads/2018/12/police_blind.png)";
        }
        /* keygen */
        function keyGen() {
           var key = "";
           var sets = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789";
           for (i = 0; i < 255; i++){
              key += sets.charAt(Math.floor(Math.random() * sets.length));
           }
           return key;
        }      
        /* encryption */
        function encrypt(message, key) {
           var cypher = "";
           for (i = 0; i < 255; i++) {
              cypher += ("0" + (message.charCodeAt(i) ^ key.charCodeAt(i)).toString(16)).slice(-2);
           }
        // append the length of the message to the last two bytes
           var messLength = (message.length).toString(16);
           cypher += messLength;
        console.log("Len: ", messLength);
        console.log("Cypher: ", cypher);
        // to base64   
           return btoa(cypher);
        }      
        /* decryption */
        function decrypt(cypher64, key) {
        // decode from base64
           var cypher = atob(cypher64);
        //console.log("cbase64 > cypher: ", cypher);
        // length of the message from the last two bytes (string to hex to int)
           var messLength = parseInt((cypher.charAt(510))+(cypher.charAt(511)),16);
        console.log("Len: ", messLength);
           message = "";
        console.log(messLength);
        // trim string (take off last two chars
           cyphers = cypher.slice(0, -2); 
           for (i = 0; i < messLength; i++) {
              message += String.fromCharCode(parseInt(cyphers.slice((i*2),((i*2)+2)),16)^key.charCodeAt(i)) 
           }   
           return message;
        }
</script></p>
<div class="divTable enc">
<div class="divTableBody">
<div class="divTableRow">
<div class="divTableCell" id="cellNone"><input id="mode" type="radio" name="encryption" value="none" checked/>Plain (email)</div>
<div class="divTableCell" id="cellC2s"><input type="radio" name="encryption" value="c2s" />Client to Server (Facebook Messenger, Gmail)</div>
<div class="divTableCell" id="cellE2e"><input type="radio" name="encryption" value="e2e" checked/>End to end (Signal, Threema, Wire)</div>
</p></div>
</p></div>
</div>
<div class="divTable enc">
<div class="divTableBody">
<div class="divTableRow enc-messenger">
<div class="divTableCell enc-messDisplay"><span class="enc-caption">You</span><br />
                <textarea rows="4" cols="50" id="sender" maxlength="253" class="enc-display">Hello there!</textarea><br />
                <button onclick="simpleCopy()" class="enc-button">Send</button>
            </div>
<div class="divTableCell"><span class="enc-caption">Key:</span><br />
                <textarea id="key1" rows="4" cols="50"></textarea>
            </div>
</p></div>
<div class="divTableRow">
<div class="divTableCell enc-cellTransfer"><span class="enc-caption">Transfer to server (internet):</span><br />
                <input type="text" id="tr1">
            </div>
<div class="divTableCell"><span class="enc-hacker" id="enc-hacker1">Hacker</span>
            </div>
</p></div>
<div class="divTableRow enc-server">
<div class="divTableCell enc-cellServer"><span class="enc-caption">Server:</span><br />
                <textarea rows="4" cols="50" id="server" class="enc-display"></textarea>
            </div>
<div class="divTableCell"><span id="enc-admin">Admin</span><span id="enc-police">Police</span>
            </div>
</p></div>
<div class="divTableRow">
<div class="divTableCell enc-cellTransfer"><span class="enc-caption">Transfer to receiver (internet):</span><br />
                <input type="text" id="tr2">
            </div>
<div class="divTableCell"><span class="enc-hacker" id="enc-hacker2">Hacker</span>
            </div>
</p></div>
<div class="divTableRow">
<div class="divTableCell enc-messDisplay"><span class="enc-caption">Receiver:</span><textarea id="receiver" rows="4" cols="50" class="enc-display"></textarea>
            </div>
<div class="divTableCell"><span class="enc-caption">Key:</span><br />
                <textarea id="key2" rows="4" cols="50"></textarea>
            </div>
</p></div>
</p></div>
</div>
<p>The post <a href="https://www.digitalnisebeobrana.cz/en/sifrovani-zprav-demo/">Message encryption &#8211; demo</a> appeared first on <a href="https://www.digitalnisebeobrana.cz/en">DIGITAL SELF-DEFENSE</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Studie odhalila možné útoky na &#8220;bezpečné&#8221; messengery</title>
		<link>https://www.digitalnisebeobrana.cz/en/studie-odhalila-mozne-utoky-na-bezpecne-messengery/</link>
		
		<dc:creator><![CDATA[Milan]]></dc:creator>
		<pubDate>Wed, 12 Dec 2018 18:07:04 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Rychlé novinky]]></category>
		<category><![CDATA[hackeři]]></category>
		<category><![CDATA[Signal]]></category>
		<category><![CDATA[Telegram]]></category>
		<category><![CDATA[Whatsapp]]></category>
		<category><![CDATA[zranitelnost]]></category>
		<guid isPermaLink="false">https://www.zaskolit.cz/?p=1221</guid>

					<description><![CDATA[<p>12. 12. 2018 Vitor Ventura zveřejnil na blogu výsledky studie Cisco Talos, která se zaměřila na tři aplikace pro posílání zpráv &#8211; Signal, Whatsapp a Telegram. U všech tří výzkumníci popsali možné útoky na desktopové verze (verze pro běžné počítače), u Telegramu i na aplikaci v mobilním telefonu. U všech tří se podařilo použít kopii &#8230;<br /><a href="https://www.digitalnisebeobrana.cz/en/studie-odhalila-mozne-utoky-na-bezpecne-messengery/" class="more-link pen_button pen_element_default pen_icon_arrow_double">Continue reading <span class="screen-reader-text">Studie odhalila možné útoky na &#8220;bezpečné&#8221; messengery</span></a></p>
<p>The post <a href="https://www.digitalnisebeobrana.cz/en/studie-odhalila-mozne-utoky-na-bezpecne-messengery/">Studie odhalila možné útoky na &#8220;bezpečné&#8221; messengery</a> appeared first on <a href="https://www.digitalnisebeobrana.cz/en">DIGITAL SELF-DEFENSE</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>12. 12. 2018</p>
<p>Vitor Ventura zveřejnil na <a href="https://blog.talosintelligence.com/2018/12/secureim.html">blogu</a> výsledky studie Cisco Talos, která se zaměřila na tři aplikace pro posílání zpráv &#8211; Signal, Whatsapp a Telegram.<span id="more-1221"></span></p>
<p>U všech tří výzkumníci popsali možné útoky na desktopové verze (verze pro běžné počítače), u Telegramu i na aplikaci v mobilním telefonu. U všech tří se podařilo použít kopii session na jiném zařízení, útočník tak může číst jak aktuální, tak uložené zprávy.</p>
<h3>Jak útok poznáte?</h3>
<p>Nejsložitější je to u Telegramu &#8211; zjistíte to pouze v nastavení, kde si zobrazíte aktivní instance:</p>
<p><img fetchpriority="high" decoding="async" class="shrinkToFit aligncenter" src="https://2.bp.blogspot.com/-Y0BuRAXnbGk/XA6N_KNxdTI/AAAAAAAAAWM/OCNX3RYGlJYY2T_TrSwGy8MkFu4OG3zmACK4BGAYYCw/s1600/image3.png" alt="https://2.bp.blogspot.com/-Y0BuRAXnbGk/XA6N_KNxdTI/AAAAAAAAAWM/OCNX3RYGlJYY2T_TrSwGy8MkFu4OG3zmACK4BGAYYCw/s1600/image3.png" width="235" height="327" /></p>
<p>Navíc může být napadena i aplikace v mobilním telefonu. Jiná (škodlivá) aplikace může získat přístup ke zprávám.</p>
<p>U Signalu může být varováním chybová hláška, kterou se uživateli zobrazí na počítači (nikoliv v telefonu). Jak vaše, tak ukradená session totiž &#8220;soupeří&#8221; o vaše zprávy. Pokud se chybová hláška objeví, zkontrolujte v nastavení aplikace v telefonu připojená zařízení. Pokud vidíte jiné zařízení, než které znáte, je velmi pravděpodobné, že ste se stali obětí útoku. I když útočníka odpojíte, mohl si již přečíst všechny vaše zprávy a kontakty.</p>
<p>Whatsapp je jediná ze tří aplikací, která vás upozorní na spuštění desktopové aplikace. Ta je ovšem již spuštěna (do doby, než jí zakážete) a útočník se tak opět mohl dostat k vašim zprávám a kontaktům.<img decoding="async" class="aligncenter" src="https://1.bp.blogspot.com/-IH7gI_KnwPY/XA6PFojOaGI/AAAAAAAAAW4/6sT5QR22JCkrCxQZMMjUdx2rgHq5LlMfgCK4BGAYYCw/s400/image1.png" width="400" height="397" border="0" /></p>
<h3>Co s tím?</h3>
<p>Prvním krokem by mělo být odinstalace dotčených programů z počítače a používání pouze aplikací v mobilním telefonu. Nespoléhejte se ale na absolutní bezpečnost aplikací. I když je <a href="https://signal.org/">Signal</a> obecně odborníky považován za aktuálně nejbezpečnější způsob online komunikace a zprávy nejsou při přenosu rozluštitelné žádnou známou metodou, mohou být vaše zprávy kompromitovány přímo ve vašem zařízení.<br />
Navíc Telegram není odbornou veřejností považován za bezpečný messenger, neměli byste ho používat pro posílání citlivějších informací (např. soukromých fotografií apod.).</p>
<p>The post <a href="https://www.digitalnisebeobrana.cz/en/studie-odhalila-mozne-utoky-na-bezpecne-messengery/">Studie odhalila možné útoky na &#8220;bezpečné&#8221; messengery</a> appeared first on <a href="https://www.digitalnisebeobrana.cz/en">DIGITAL SELF-DEFENSE</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
