Look, I went over the Snowden documents as a journalist, but I never saw anything that shocked me quite like this story of Meta buying a VPN company for "security" but then spying on users of competitive apps by decrypting the traffic.

This is a real SSL added and removed here :) moment.

Seriously, like wow: https://techcrunch.com/2024/03/26/facebook-secret-project-snooped-snapchat-user-traffic/

Court document: https://storage.courtlistener.com/recap/gov.uscourts.cand.369872/gov.uscourts.cand.369872.735.0.pdf

Facebook snooped on users' Snapchat traffic in secret project, documents reveal | TechCrunch

A secret program called "Project Ghostbusters" saw Facebook devise a way to intercept and decrypt the encrypted network traffic of Snapchat users to study their behavior.

TechCrunch

@seriouslyjeff I think I'm missing a piece of the picture. Do these Android kits allow downgrading TLS connections to plain HTTP?

Like the article explains, merely providing a VPN wouldn't have been very effective as Snapchat was using TLS, so they would just see a lot of encrypted traffic.

It's not clear to me how they managed to intercept the content that should have been encrypted on the client. 🤔

EDIT: Solved, see my self-reply.

@seriouslyjeff Nevermind sorry, I overlooked the court document you linked. So they installed a Root CA to hijack the traffic. Holy fuck.

The reason why it was unclear to me is that I did not expect them to pull this. I kind of wondered if there was a more "legitimate" way of doing this rather than something which is absolutely illegal.

Thanks for sharing!

@seriouslyjeff Been thinking about this a little bit more. It sounds exponentially more predatory to target teens.

You know, the demographic where hormones go wild and the concept of risk often isn't very well understood.

On a platform on which these users assume* (however naive that may be) to have at least some degree of privacy.