Live WhatsApp Inter...
 
Notifications
Clear all

Live WhatsApp Interception

2 Posts
2 Users
0 Reactions
498 Views
RolfGutmann
(@rolfgutmann)
Noble Member
Joined: 10 years ago
Posts: 1185
Topic starter  

Mr. John McAfee claimed mid May that WhatsApp messaging is live interceptable because of weak security in Android OS. He mentioned that Lifars Forensic Ltd., has proven this. Besides that postcrime analysis of WhatsApp messages in this forum discussed and nowadays forensics daily evidence, is there really an approach Android-based to live intercept WhatsApp's Signal encryption based on Moxie Marlinspike's cryptographers work for he should be officially awarded?

http//www.engadget.com/2016/05/15/john-mcafee-claims-to-crack-whatsapp-messages/

We may here in Europe did not get the full picture. Please help us to head-up. Thank you!


   
Quote
(@droopy)
Estimable Member
Joined: 11 years ago
Posts: 136
 

Whatsapp and Signal are really easy to intercept.
I have decompiled and study source code.
Many bugs on implementation, exploits and moxie implementation is horrible.

I have posted 3 pictures, and if you need more details i could post whatever as i have studied since 6 months ago all the code.

Due to legal regulations, posting the whole source of whatsapp is not recommended, but screencaptures or forensic analysis is ok.

Even Rule 1 NEVER trust a software that ask for REAL PHONE NUMBER.
taig9 and many hacking groups sells remote exploits to goverments for intercepting whatever "encrypted" product is on the market.
Most , almost ALL, have backdoor. Silent Circle has buffer overflow exploits on code ON PURPOSE, telegram uploads your contacts and metadata, etc.

If you know a real "secure" product, just contact me, i will decode it.


   
ReplyQuote
Share: