Nokia Admits Decrypting User Data Claiming It Isn't Looking 264
judgecorp writes "Nokia has admitted that it routinely decrypts user's HTTPS traffic, but says it is only doing it so it can compress it to improve speed. That doesn't convince security researcher Gaurang Pandya, who accuses the company of spying on customers."
From the article, Nokia says: "'Importantly, the proxy servers do not store the content of web pages visited by our users or any information they enter into them. When temporary decryption of HTTPS connections is required on our proxy servers, to transform and deliver users' content, it is done in a secure manner. ... Nokia has implemented appropriate organisational and technical measures to prevent access to private information. Claims that we would access complete unencrypted information are inaccurate.'"
What? (Score:4, Insightful)
security researcher Gaurang Pandya
What are this guy's credentials apart from being a guy with a blog?
Amazon Silk browser does the same, Opera mini does the same, what's with this jumping on the Nokia hate bandwagon? Perhaps they should stop proxying HTTPS traffic, but remember in third world countries data comes at a HUGE premium, so these services are a god send, especially with a lot of sites moving to HTTPS by default. I would hope that Opera/Amazon/Nokia are atleast as credible as your ISP though it's an additional point of failure.
Fedware (Score:4, Insightful)
We don't access your personal information with our closed source NSA backdoors, we just plug this strange Narus device into our routers.
Re:How do they even do that? (Score:5, Insightful)
There must be serious flaws in HTTPS if they can decrypt the traffic for hosts that they don't control the certs for.
They control the browser. According to the article, the necessary certificate is installed on phones as Nokia ships them.
This is exactly what i was thinking/fearing. This is some scary shit, basically you ought to treat HTTPS on your Nokia device like HTTP, unless you really really trust that Nokia knows what they are doing and how to keep a secret. The striking thing is that users obviously have no idea they are handshaking with Nokia instead of their bank, doctor, etc. Are there at least alternate browsers available?
Re:What? (Score:4, Insightful)
Your ISP cannot decrypt SSL traffic.
Not everyone lives in a third world nation and surely they should be able to opt out of this.
Re:What? (Score:5, Insightful)
Amazon Silk and Opera mini clearly states that every single connexion goes through them in clear. I do not think nokia does.
My ISP does not do that. When I negogiate an HTTPS session, my ISP does not intercept it and perform a MITM attack. apparently nokia does.
That's so much not ok.
CORRECTION (Score:4, Insightful)
Wrong profile linked. Correct [linkedin.com] profile. Stupid misclick. Ugh. In other news, his background is not a software developer, but a network admin with some cisco experience. Like many in that area of IT, there is some exposure to security. I wouldn't call him an expert in MIM attacks, but he's not a layperson either.
"In a secure fashion..." (Score:5, Insightful)
...my ass
Right up until the government shows up and demands that they send all the traffic to them first, and forbids them from notifying their customers.
Re:Any browser publisher is the same way (Score:5, Insightful)
Yeah, because having the browser display the page locally is just exactly the same as having a remote server decrypt your connection as a man in the middle.
Re:What? (Score:3, Insightful)
I know this is slashdot and we do not read much what people so that we can rant and seem smart. But come on, it is written in TFS and TFT (the F-ing title). "Nokia admits decrypting user data." From their own admission, they are performing a MITM attack, that is to say, they are putting themself in the middle of an encrypted connexion making each party believe they are directly and securely talking to each other.
Whether they clearly explained it to the user, I do not know, but I am sure they are performing MITM.
Re:Any browser publisher is the same way (Score:5, Insightful)
Nothing stops the browser from transmitting information to a third-party server.
=>
Re:How do they even do that? (Score:5, Insightful)
Your trust is extended because of the expectations involved. The user/owner of the device is not informed that, unlike his PC or other smart phone devices, Nokia is handling encyption differently. As https is used primarily for the purpose of securing data traffic between the user and their banks or their other services which need security, the expectation has always been that it would not involve the maker of the device which is being used.
I "trust" my car maker to build a good car. I do not "trust" them not to install cameras in it without my knowledge and then tell me later "there are cameras, but we are not looking at the video feed."
Re:What? (Score:5, Insightful)
I know this is slashdot and we do not read much what people so that we can rant and seem smart. But come on, it is written in TFS and TFT (the F-ing title). "Nokia admits decrypting user data."
Would you rather they didnt encrypt the data and sent it over the air like that instead?
You claim to know that this is slashdot, but dont seem to know to at least make an attempt to understand the technologies that you are talking about? Worthless blabber.
Hint: the phone is not the endpoint of the browsing session - the phone is a remote terminal for a server that is the endpoint of the browsing session
Re:illegal here (Score:4, Insightful)
It may be illegal in the US as well
Just like warrantless wiretapping...oh wait!
Re:Any browser publisher is the same way (Score:4, Insightful)
> If it's open source YOU have the power to stop it from doing anything like that
In principle and theory, yes. In practice, maybe not. You would almost certainly use libraries installed on the device, unless you plan to roll your own from scratch (and that's going to eat a lot of SRAM). They could still sniff and snoop at the library level.
Or, they could simply sniff and snoop whatever is displayed on the screen. Your open-source browser is "clean," but Nokia is, in essence, a snoop looking over your shoulder. Character-recognition software is small and fast nowadays.
Waiting for a Slashdot story about how THAT is happening, by the way. Some manufacturers and providers are already admitting that they can access the mike and the camera on your smartphone to "see" and "hear" what you're up to ...
Ergo, I have no doubt whatsoever that even using an open-source browser won't protect you. The only real answer is to ensure that you never do anything really sensitive on a smartphone. I certainly don't.
It's easy when you're god (Score:3, Insightful)
Not really, it's relatively trivial to establish a man in the middle attack if you completely control the communication channel. A requests a secure channel to B from C. Instead C establishes a secure channel with A *claiming* that it's B, while also establishing a secure channel to B claiming that it's A. Theoretically any node your connection passes through could do this, but given the fluidity of internet routing algorithms only the ISPs at either end are likely to be able to actually pull it off. Or any routers between them and the actual computers that are doing the talking of course.
That's why they tell you never to do internet banking, shopping, etc. at an internet cafe or other open hotspot - a fully controlled malicious data channel can do whatever it wants, and how are you going to detect it? All the validation has to go through them.
In the case where you have vendor-controlled browsers or proxy servers it's even easier, but basically those are just additional nodes your data is guaranteed to pass through.
It's a documented and advertised feature (Score:5, Insightful)
If you don't trust Nokia to not snoop on your data then why are you carrying around a device made by Nokia that contains a camera and a microphone and a cellular connection to the internet (and probably a gps though I don't know the details of Nokia's phones)?
Re:Any browser publisher is the same way (Score:5, Insightful)
From what I understand, the browser is not doing HTTPS at all to the bank/docter etc, its doing HTTP or HTTPS to the nokia proxy and proxy is doing the HTTPS to bank/doctor. In this scenario HTTPS is not broken, the phone is. Total fail Nokia
it's doing a special protocol to nokias servers(encrypted).
just like opera mini has been doing for years.
they did this as a feature catchup. also it enables them to actually RENDER THE FUCKING PAGES THE PHONE WOULDN'T OTHERWISE BE ABLE TO. that's how these light browsers manage to do their magic on really shitty hw.
sometimes slashdot feels like full of fucking idiots who have been living under 324 feet of rock without internet.
if you don't like it, buy a phone that costs more than ninety bucks(no subs).
here's a shocking reveal of opera mini passing all data through their servers on slashdot from 2006 http://tech.slashdot.org/story/06/01/24/227227/opera-mini-mobile-browser-officially-released [slashdot.org]
Re:If it was so good then why didn't you tell us? (Score:4, Insightful)
They advertise the feature without advertising the implications.
Of course, that's called "marketing". Push up the upsides, burry the downsides.
Re:Any browser publisher is the same way (Score:4, Insightful)
The difference is that Opera Mini is explicitly advertised as a "proxy browser". If you choose to use it, you know what it is about, and what the implied security risks are.
Here, we're talking about a stock browser in a smartphone, doing this by default with no warnings given to the user. I don't care why they thing it's a good idea, it's a major compromise of security.
Re:Any browser publisher is the same way (Score:4, Insightful)
you trust Google over Microsoft?
one of those companies has a business model that relies on gathering as much information about you that it can and selling it to advertisers.
the other one sells software.