Security/cryptography analysis of Threema end-to-end instant messenger. Interesting insight for anybody designing modern security infrastructure. "Using modern, secure libraries for cryptographic primitives does not on its own lead to a secure protocol design" https://breakingthe3ma.app/files/Threema-PST22.pdf
@LukaszOlejnik Uff. I would like to see a response from Threema to this... @threemaapp
Threema (@[email protected])

There’s a new paper on Threema’s old communication protocol. Apparently, today’s academia forces researchers and even students to hopelessly oversell their findings. Here’s some real talk: https://threema.ch/bp/new-paper-on-old-threema-protocol

Mastodon
@cgranade @LukaszOlejnik @da_beda Cool and thank you!
I'm positively surprised - an answer many other companies should use as an example how to handle things @threemaapp
@LukaszOlejnik khmm I never ended up using it... guess my choice and gutt feeling wasnt off again

@LukaszOlejnik Interesting paper. #Threema’s response very much comes across as downplaying:

· Threema does not link to the paper, instead preferring that people build their opinion only from the information Threema provides.
· Threema does not mention the issues being reported to them in October 2022. Neither do they mention when the new Ibex communication protocol was released (November 2022). This way they don’t have to answer the question whether all these issues being addressed in Ibex was a coincidence or the result of responsible disclosure.
· At the same time their blog post suggests that the researchers were investigating an outdated protocol. No, the protocol they investigated was current at the time. It only got replaced after Threema received the reports.
· There is some dismissing of issues as not having real-world impact. This may be the case, yet they are still design flaws even if nobody managed to exploit them (e.g. because other security layers prevented that).
· “Extensive prerequisites” doesn’t necessarily devalue a finding like Threema’s blog post seems to suggest. Exploitation may look implausible now, but with the flaw being out there someone might find easier ways to exploit it.

In the end, I think that the researchers do oversell their achievements. These flaws aren’t nice, but they don’t really compromise the integrity of the protocol either.

Still, Threema could have handled it better. Being serious about security means not dismissing issues just because these have low impact, are hard to exploit or apply to a protocol that you are in the process of replacing anyway. Each reported issue is a chance for you to learn.

@LukaszOlejnik its only a doc or what?