Hacker News new | past | comments | ask | show | jobs | submit login

> they get their device list keys from the server

Which means the server can just substitute keys in.




Right, but that doesn't compromise the security of the service necessarily.

Users can catch a malicious server injecting incorrect keys by looking at security notifications and comparing security codes. This is part of the Signal protocol.

This may be tedious but only needs to be done in the event of phone keys getting reset (a once in a year event?), as all companion device keys are automatically verified with signatures provided from an account owner's primary (phone) device

Source: https://www.whatsapp.com/security/WhatsApp_Security_Whitepap...




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: