Readit News logoReadit News
willstrafach commented on How did Facebook intercept their competitor's encrypted mobile app traffic?   doubleagent.net/onavo-fac... · Posted by u/haxrob
theptip · a year ago
This is a bit tangled. I think this is new information but it’s all about Onavo. From OP:

> Note this is different to what TechCrunch had revealed in 2019 in which Facebook were paying teenagers to gather data on usage habits. That resulted in the Onavo app being pulled from the app stores and fines. With the new MITM information revealed: what is currently unclear is if all app users had their traffic "intercepted" or just a subset of users.

So this seems to be new information about the Onavo Android app, but it’s not clear to me if the “install cert” button described was exactly the implementation of the previously reported research cert, or a new vector where people other than market research participants were MiTM’d. The analysis is just a bunch of circumstantial observations that _it is possible_ FB was doing more skeezy stuff than was previously known. But nothing here is incompatible with the previously reported stuff being all that happened, AFAICT.

The TechCrunch article clearly states that Onavo was the method they used to get the FB Research cert onto devices. (Presumably they distributed a different build of Onavo with their enterprise distribution channel), it quotes:

> “We now have the capability to measure detailed in-app activity” from “parsing snapchat [sic] analytics collected from incentivized participants in Onavo’s research program,” read another email.

This sounds to me that there was one Onavo research program, but who knows, we have multiple project codenames.

willstrafach · a year ago
“Facebook Research” was the Onavo codebase, under a different name, signed by Facebook’s Enterprise certificate.
willstrafach commented on Apple responds to the Beeper iMessage saga: 'We took steps to protect our users'   theverge.com/2023/12/9/23... · Posted by u/herbertl
lxgr · 2 years ago
> Don't they have a database of every device they've sold?

A database isn't enough. They'd also need a way for that device to attest its identity to Apple, and serial numbers can be relatively easily copied (or sometimes even brute-forced).

This should be possible for newer devices using Apple's own chips, but I believe that at least non-T1/T2 Intel Macs lack any such capability.

> Why don't they check "is this device sitting on a shelf un-sold or does it belong to this account, activated"?

How would they know this? I highly doubt that every retailer in the world reports sold devices' serial numbers to Apple.

willstrafach · 2 years ago
iOS devices must be activated to use them. This is indeed stored in a database. AppleCare and third-party repair centers can query activation information using GSX.

You are correct about pre-T1 Intel Macs though. Apple will have a blind spot by design, until support is dropped for old machines.

willstrafach commented on Apple Passkey   developer.apple.com/docum... · Posted by u/samwillis
kps · 3 years ago
I'm writing this on a non-Apple computer that doesn't have any radios. Now what?
willstrafach commented on Tim Hortons app violated laws in collection of ‘vast amounts’ of location data   priv.gc.ca/en/opc-news/ne... · Posted by u/danso
christophilus · 3 years ago
I don’t have many apps. I use my browser for just about everything: weather, search, YouTube, etc.

I’d be really interested to see how much my phone leaks to services like this vs the average phone. I bet it’s still a shockingly large amount.

That said, doesn’t iOS notify you when an app wants to use location services? Did all of these users just opt into that? That seems crazy, if so.

willstrafach · 3 years ago
> That said, doesn’t iOS notify you when an app wants to use location services? Did all of these users just opt into that? That seems crazy, if so.

Not so crazy.

Local news, weather, and similar apps with a reasonable rationale for Location Services access are often the culprits.

They will put phrases like “See privacy policy.” in the justification text (When asking permission) so they can claim that the user consented.

willstrafach commented on Tim Hortons app violated laws in collection of ‘vast amounts’ of location data   priv.gc.ca/en/opc-news/ne... · Posted by u/danso
xhrpost · 3 years ago
I recently added AccuWeather back to my device. I didn't permit continuous access to location and it kept an incorrect city for the desktop widget. I was tempted to give full access but now I realize I'm best to just delete the widget at least and double check permissions.
willstrafach · 3 years ago
They have some pretty bad past practices: https://www.zdnet.com/article/accuweather-caught-sending-geo...

And they have continued, off-and-on, to use other location-collecting SDKs.

willstrafach commented on How our free plan stays free   tailscale.com/blog/free-p... · Posted by u/tosh
xanaxagoras · 3 years ago
I've wondered this as well. Everyone seems to rave about it, but I run my own wireguard and don't find it too hard to add devices to the network. I think maybe you can use it to expose certain things to the internet easily? I don't have a lot of trouble doing that either. I've scrolled around their marketing site for a few minutes before and I just don't really get what all the fuss is about. I'm sure I'm missing something.

I will say, and I think this is right, the proposition here isn't a VPN like Nord which you'd use to hide your traffic from your ISP or masquerade into a different geolocation, but rather a VPN for connecting to your own devices.

willstrafach · 3 years ago
I think the pitch here is “Semi-managed WireGuard peer provisioning and NAT punching as a service” usable by anyone who may not otherwise have a clue how WireGuard works (eg. friends sharing access to a file/media server), within 5 minutes or less from download/login to “done”
willstrafach commented on Who's Attacking My Server?   bastian.rieck.me/blog/pos... · Posted by u/Pseudomanifold
pengaru · 3 years ago
> I think a better solution now is something like Tailscale for anything administrative. I’ve been doing this for Minecraft servers for a year or two, and it eliminates a ton of BS.

All I'm hearing is that Tailscale is becoming an increasingly attractive bastion host to compromise, then use as a jump server to access heaps of poorly configured customer machines.

willstrafach · 3 years ago
How would that work? Connections are mainly peer-to-peer with Tailscale. An attack (I suppose pushing new key pairs to specific peers and pointing them through a malicious endpoint?) would likely require a very noisy and detectable process.
willstrafach commented on “O, so sorry. I need more time. my country defending Russian invasion”   github.com/insky/vue-gpic... · Posted by u/EdwinHoksberg
CGamesPlay · 4 years ago
Is this staged? The pinging account was created seconds before the comment was posted and seconds later the developer replies. The developer who is of course defending against a real life invasion of his home country.
willstrafach · 4 years ago
This may make sense if they were replying via e-mail to the issue.
willstrafach commented on Our User-Mode WireGuard Year   fly.io/blog/our-user-mode... · Posted by u/xrd
the_biot · 4 years ago
Fly-Region: fra
willstrafach · 4 years ago
Different poster here but just curious: Are you a Deutsche Telekom user, by chance?
willstrafach commented on Facebook-owned sites were down   facebook.com/... · Posted by u/nabeards
account42 · 4 years ago
You just need to get a large enough block so that you can throw most of it away by adding your own vanity part to the prefix you are given. IPv6 really isn't scarce so you can actually do that.
willstrafach · 4 years ago
The face:b00c part is in the Interface ID, so this did not even need a large block (Though I am sure they have one).

u/willstrafach

KarmaCake day1179February 19, 2016
About
information security and privacy research.

Chief Executive Officer @ Guardian (https://guardianapp.com).

previously: founder of "Chronic Dev Team" & worked on many years of iOS jailbreaking solutions (24kPwn, absinthe, corona, greenpois0n, etc).

View Original