Skip to main content
banner image
venafi logo

Someone failed Jeff Bezos’ iPhone. Telegram says it’s WhatsApp. [Encryption Digest 29]

Someone failed Jeff Bezos’ iPhone. Telegram says it’s WhatsApp. [Encryption Digest 29]

WhatsApp encryption
February 6, 2020 | Katrina Dobieski

I’m thinking that maybe I should start using a brick. An actual, every-day brick. But only if it runs on Android OS. Apparently, the connection between our cell phone towers and our phones isn’t encrypted, with no imminent plans to encrypt in the future. On that topic, Facebook says Jeff Bezos got his personal messages exfiltrated because he was using an iPhone, and Telegram says it was because he was using a Facebook product. Interestingly, they both might have a good point as government phone hackers are now saying Android is putting up a fight in the “don’t decrypt me” category, while iPhones (all of them) have fallen prey to industry hacking devices. So, until some things get sorted out, I may opt for a VPN protected carrier pigeon.

How prevalent are TLS certificates on the Dark Web? Find out.

Someone failed Jeff Bezos’ iPhone. Telegram says it’s WhatsApp.

Let’s point some fingers. Telegram founder Pavel Durov points out that if Jeff Bezos had only been using his encrypted platform, Jeff Bezos’ personal information would still be safe.

Facebook says that it was Apple’s OS that let him down, not brainchild WhatsApp.

Either way, if any of us want to avoid a similarly uncomfortable fate, maybe we should investigate what we know. 

The facts:

  • Investigators lean toward implicating a 4.4MB malware-infested video file Bezos received (over WhatsApp). It was similar to another 2014 WhatsApp video malware attack on activists and journalists by Israel’s NSO group.
  • Facebook’s VP of Global Affairs and Communications responded with “It sounds like something on the… you know, what they call the operate, operated on the phone itself. It can’t have been anything, when the message was sent, in transit, because that’s end-to-end encrypted on WhatsApp.
  • The WhatsApp video vulnerability spans across the board—Android, Windows and iOS—so the vulnerability does not seem to be tied to a particular OS.
  • WhatsApp is allowed in countries where Telegram is not. Says Durov “We’ve been approached by some [enforcement agencies]—and refused to cooperate. As a result, Telegram is banned in some countries where WhatsApp has no issues with authorities, most suspiciously in Russia and Iran.”

I’m right. So what?

In a straight-between-the-eyes answer to the question of his bias, Durov replies, “Of course I consider Telegram Secret Chats to be significantly more secure than any competing means of communication – why else would I be developing and using Telegram?”

Related posts


What’s Safer? Hackers Say It’s Android over Apple

Things might have been different a year ago. “A year ago we couldn’t get into iPhones, but we could get into all the Androids. Now we can’t get into a lot of the Androids,” revealed Detective Rex Kiser, who conducts digital forensic examinations for the Fort Worth Police Department, in a comment to Vice.

Times have changed, and as the battle to secure the encryption front faces increasing pressure from both sides, it seems Android has held the line—even improved it.

Take results from one frequently used hacking tool, for example. Cellebrite, a contractor popular with government agencies, has a device designed to break the unbreakable. This would allow access into a users’ private files for the purpose of providing implicating evidence in criminal trials.

"It can crack all iPhones up to iPhone X"

It can crack all iPhones up to iPhone X. However, when up against Android devices, it has a harder time swiping data (GPS, social media, browsing) from phones like the Samsung Galaxy S9, the Google Pixel 2 and Huawei P20 Pro - from which it literally got nothing.

However, government agencies can still use other means to crack stubborn tech—just not the Cellebrite tool. There are agencies, notably the Remote Operations Unit, which upon consideration by the Inspector General of the Justice Department, could have been consulted by the FBI in wake of the 2015 San Bernardino shootings. In the report, it is suggested that the FBI “could have done more” to crack the phone via available internal means before going to Apple. The process is more “labor intensive and takes more time and resources,” but ultimately, can be done.

In a very real way, this is a case study of what could happen if backdoors really were implemented. In some cases, they might have already been. The vulnerability cuts across phones, operating systems and hardware security right to the code. The same backdoors that gather data on criminals and pedophiles gather data on you, me and Jeff Bezos.

Related posts



Your Secure Connection to Cell Towers Has Never Been Secure

Should we start making things safer? That seems to be a question we’re asking ourselves as we catch our breath in the wake of breakneck technological advancements like the internet and 5G.

The answer these days, seems to be—yes. We might wonder why we didn’t make them “safe” to begin with, but the dot com era was a forgivable utopia of idealists.

However, safety now has to compete with legacy technologies and industries that (literally) aren’t built for it. Take, for example, cell towers. Your phone connects with the nearest cell tower available. No authentication, no credentialing required. Some of the older phones couldn’t handle that anyway. Only, in that ease lies the vulnerability to stingray attacks. These are false base camps broadcasting the same “system information messages” as real cell phone towers and passing off as the real thing. And your mobile device can’t tell the difference.  

Cue Yomna Nasser, research engineer, and her talk at the USENIX Enigma security conference on Monday. She believes there is a way to provide encryption for pre-authentication messages (or those pings from the cell phone tower to your phone), and her full plan is laid here.

It works similarly to HTTPS encryption and would require phones to check the cell tower’s digital certificate prior to connecting. Just like online. With the push of the last decade to “encrypt the internet,” this seems like a logical next move.

HTTPS similarities aside, there are just a few barriers:

  1. Authenticating encryption adds a few more bytes of data per connection, which translates to dollars for network operators.
  2. Legacy phones might not connect, so a two-pronged approach would need to be adopted to both protect the new tech and support the old.
  3. Software, and in some cases hardware, changes would have to be made across the existing infrastructure, which could be expansive.
  4. Adoption is unlikely without a mandate.

Researcher Roger Piqueras Jover from Bloomberg LP agrees a fix is overdue - "It’s been many, many years, even decades, and we still have the same problems.” However, while awareness might be rising and there may be concessions for safety in the 5G standard, until “option” is no longer part of adoption, implementation might be a long time coming.

As Jover points out, “It’s complicated—the way cellular networks are designed is based on standards developed by industry players with maybe non-aligning incentives."

While we fight the fight to protect our privacy online, low-tech hackers might be peering into other parts of our personal lives by just sneaking into our phones. The backdoor debate is far from the only front in the encryption fight. It seems until the pain of compromise by Stingray attack finally hits mobile network providers (or until ink is put to paper) those ideas might be just like our unencrypted data – floating uncomfortably out in the ether.  


Make sure you know the basics of symmetric encryption. Our Chalk Talk video gives a refresher course.





Learn more about machine identity management. Explore now.


Related posts


Like this blog? We think you will love this.
Featured Blog

Microsoft Backs Off Internet Office Macro Ban [Update]

Microsoft disabled macro years ago by default

Read More
Subscribe to our Weekly Blog Updates!

Join thousands of other security professionals

Get top blogs delivered to your inbox every week

See Popular Tags

You might also like

TLS Machine Identity Management for Dummies

TLS Machine Identity Management for Dummies

Certificate-Related Outages Continue to Plague Organizations
White Paper

CIO Study: Certificate-Related Outages Continue to Plague Organizations

About the author

Katrina Dobieski
Katrina Dobieski

Katrina writes for Venafi's blog and helps optimize Venafi's online presence to advance awareness of Machine Identity Protection.

Read Posts by Author
get-started-overlay close-overlay cross icon
get-started-overlay close-overlay cross icon
Venafi Risk assessment Form Image

Sign up for Venafi Cloud

Venafi Cloud manages and protects certificates

* Please fill in this field Please enter valid email address
* Please fill in this field Password must be
At least 8 characters long
At least one digit
At last one lowercase letter
At least one uppercase letter
At least one special character
* Please fill in this field
* Please fill in this field
* Please fill in this field

End User License Agreement needs to be viewed and accepted

Already have an account? Login Here

get-started-overlay close-overlay cross icon

How can we help you?

Thank you!

Venafi will reach out to you within 24 hours. If you need an immediate answer please use our chat to get a live person.

In the meantime, please explore more of our solutions

Explore Solutions

learn more

Email Us a Question

learn more

Chat With Us

learn more