this post was submitted on 08 Mar 2024
332 points (97.4% liked)
Europe
8324 readers
1 users here now
News/Interesting Stories/Beautiful Pictures from Europe ๐ช๐บ
(Current banner: Thunder mountain, Germany, ๐ฉ๐ช ) Feel free to post submissions for banner pictures
Rules
(This list is obviously incomplete, but it will get expanded when necessary)
- Be nice to each other (e.g. No direct insults against each other);
- No racism, antisemitism, dehumanisation of minorities or glorification of National Socialism allowed;
- No posts linking to mis-information funded by foreign states or billionaires.
Also check out [email protected]
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
How is it possible to accomplish a man in the middle attack on a TLS secure connection ? Hotel wifi or not, unless something major like Singaporean gov interfered with the connection, forced forged certificates into his phone, I don't see how this was put off by compromising the connection .
I bet they are covering for the Fact that one of them has downloaded malware into his device to masturbate to a hot girl living next to him kinda ad. and then malware shared back that data to Russia. or they have a spy among them and Germany isn't ready to admit having its defense forces compromised with Russian assets.
The easiest explanation is the room was bugged and the general stayed there.
Everyone forgets the old school stuff. It doesn't matter how well your connection is encrypted if the GRU has the room next to you.
they were using an insecure method to connect with webex, so something like a dial-in number for using it without a computer i guess. that is probably not encrypted. the meeting could have been a fax anyway
Do you think Webex doesn't reject insecure connections ? it is the bare minimum for any web app.
but the audio in the hands of the Russians sounds crystal clear! and you can hear all the participants very clearly, which means it has been captured from one of the involved devices.
not sure how they would check a landline call for security ๐คท
All the data goes to the man in the middle. Worse, there's nothing stopping a user from connecting for other things. So a man in the middle can act like a trusted source while sending malware to the device. If they compromised the phone/computer then the encrypted tunnel is moot. It has to be decrypted at some point, even if the malware literally just creates a recording.
TLS means dick if you have a nation-state that can mint a cert that would be trusted by your browser. Unless you're using a site that does cert pinning (which is basically a list your browser has of URLs and expected cert fingerprints as published by the site owners) or the fuckery that Google gets up to in chrome (they monitor and immediately ping the mother ship if a Google property is detected using an unauthorized cert), you can't really stop or detect it as an end user.
Your computer trusts so many companies to vouch for other sites' legitimacy that it's not out of the realm of possibilities that they leaned on a CA and minted a cert to let them MITM the connection. You're still connecting to a "trusted" cert, even if it isn't the legitimate one.