Ref [here]

Great Update, but “TL;DR: Don’t Turn It On”

--

As the UK wrestles with the Franstein’s monster that is end-to-end encryption (E2E), much of the cybersecurity community know that it has been the savour our flawed Internet. The protocols used in creating the Internet nearly really had a focus on cybersecurity — they just needs to make sure that a packet from one computer will arrive at another one in a relable way. If we were to start again, we would certainly encrypt our data at its core, and not rely on network protocols to perform our encryption.

And, so, you hope that some of the fundamental building blocks of our more security Internet will be solid, as so many things build on them. But, think again, here’s a recently blog post outlining the risks of updating the Google 2FA Authenticator [here]:

The new update addresses a major problem with our authenication, and where you might lose the device with your main authenicator. This update aims to synchonise you the 2FA onto a number of your devices. But, in a forensic analysis of the networked traffic, it was found that the network traffic for the synchonization of the added…

--

--

Prof Bill Buchanan OBE FRSE
ASecuritySite: When Bob Met Alice

Professor of Cryptography. Serial innovator. Believer in fairness, justice & freedom. Based in Edinburgh. Old World Breaker. New World Creator. Building trust.