The Register: WhatsApp’s ‘View Once’ could be ‘View Whenever’ due to a flaw

Source URL: https://www.theregister.com/2024/09/09/whatsapp_view_once_flaw/
Source: The Register
Title: WhatsApp’s ‘View Once’ could be ‘View Whenever’ due to a flaw

Feedly Summary: It promised vanishing messages, but now ‘it’s privacy theater’
Video A popular privacy feature in WhatsApp is “completely broken and can be trivially bypassed," according to developers at cryptowallet startup Zengo.…

AI Summary and Description: Yes

Summary: The text highlights a significant security vulnerability in WhatsApp’s “View Once” feature, which allows users to send media that is intended to be viewed only once. Developers from Zengo found that the feature is easily bypassed, undermining its privacy intent. This revelation points to broader implications for the design of privacy features in software and the security of user data on communication platforms.

Detailed Description:
The article discusses a serious flaw in WhatsApp’s “View Once” feature, revealing that the security measures intended to protect user privacy can be easily circumvented:

– **Discovery of the Vulnerability**:
– Developers at Zengo, while building a web interface, identified the flaw.
– The WhatsApp API server fails to enforce proper controls, allowing “View Once” messages to be accessed inappropriately.

– **Technical Explanation**:
– “View Once” messages are technically identical to standard media messages and can be manipulated by changing a flag from true to false.
– This means that messages marked as “View Once” can be modified to act as regular messages, allowing easy saving, forwarding, and sharing.

– **Privacy Implications**:
– The intended privacy safeguard is rendered ineffective, likened to “privacy theater” by Zengo’s cofounder, Tal Be’ery. This critique reflects the broader issue of software design flaws that fail to robustly protect user privacy.
– Be’ery emphasizes that the poor design compromises its purpose, resulting in a poorly executed solution that could lead to widespread privacy violations.

– **Broader Context and Response**:
– The developers discovered existing code examples on GitHub that exploit this issue, which prompted them to disclose it publicly rather than adhering to the standard responsible disclosure timeframe.
– WhatsApp’s response acknowledges the issue and asserts that they are investigating and preparing a fix.
– They encourage users to exercise caution by only sending view-once messages to trusted contacts, highlighting an ongoing need for user education regarding app security features.

– **Significance for Security Professionals**:
– This incident underscores the critical need for rigorous security testing in software development, particularly for features designed to protect privacy.
– Security professionals should assess the potential for similar vulnerabilities in other applications and advocate for better design practices that prioritize privacy and security.
– This situation illustrates the importance of bug bounty programs in identifying vulnerabilities and incentivizing responsible reporting.

Overall, this situation brings to light essential considerations regarding security and privacy in today’s digital communication platforms, emphasizing the need for continuous scrutiny of software design and user safety.