July 28th, 2024

How did Facebook intercept their competitor's encrypted mobile app traffic?

Facebook faces a class action lawsuit for allegedly intercepting encrypted traffic from the Onavo Protect app, violating the Wiretap Act through a man-in-the-middle attack to monitor competitors' data.

Read original articleLink Icon
OutrageDistrustSkepticism
How did Facebook intercept their competitor's encrypted mobile app traffic?

Facebook is currently facing a class action lawsuit alleging that it intercepted encrypted traffic from users of the Onavo Protect app, which it acquired in 2013. The lawsuit claims that Facebook violated the Wiretap Act by employing a technique known as "ssl bump," a form of man-in-the-middle (MITM) attack, to decrypt users' HTTPS traffic. This method involved prompting users to install a certificate authority (CA) certificate issued by "Facebook Research" on their devices, allowing Facebook to monitor traffic to specific domains, including those of competitors like Snapchat, YouTube, and Amazon.

Court documents indicate that the Onavo Protect app contained code to facilitate this interception, and older versions of the app included embedded CA certificates. However, improvements in Android's security measures over time made this interception increasingly difficult. The lawsuit highlights concerns about the ethical implications of using accessibility features for competitive advantage, as well as the legality of intercepting encrypted communications without user consent.

Facebook's motivation for this strategy appears to stem from a desire for "reliable analytics" on competitors, with Mark Zuckerberg emphasizing the need for detailed insights into user behavior. Despite the app being shut down in 2019 following scrutiny, the investigation into its practices continues, raising questions about the legality and ethics of Facebook's data collection methods. The outcome of the lawsuit could have significant implications for the company's practices and user privacy.

AI: What people are saying
The comments reflect a range of opinions and concerns regarding Facebook's alleged interception of encrypted traffic through the Onavo Protect app.
  • Many commenters question the ethics of user consent, suggesting that participants may not fully understand the implications of their actions.
  • There is skepticism about the legality of Facebook's actions, with some arguing that if individuals did the same, they would face severe legal consequences.
  • Concerns are raised about Facebook's technical capabilities and potential misuse of user data, particularly regarding tracking and monitoring.
  • Some commenters express a general distrust of Facebook as a company, highlighting a negative perception compared to other tech firms.
  • Several users mention the broader implications of such practices, suggesting that they could lead to more significant privacy violations and security risks.
Link Icon 26 comments
By @theptip - 6 months
So just to be clear on what is being alleged, because the write-ups are omitting this detail: from what I can tell FB paid SC users to participate in “market research” and install the proxy.

The way most of the writeups make it sound is that it’s some sort of hack, but this doesn’t seem to be the case. (I’d love to get more detail on exactly what the participants were told they were getting paid for, but I’d be surprised if they did not know their actions were being monitored.)

The accusation that it’s wiretapping if one party in the communication channel is actively breaking the encryption (even with a tool provided by a third party) seems tenuous to me, but IANAL. If this is wiretapping, is it also wiretapping for me to use a local SSL proxy to decrypt and analyze traffic to a service’s API?

By @dylan604 - 6 months
The email snippets are impressive on multiple levels, mainly how fucking stupid/arrogant people at FB must be. Openly talking about MITM, and then getting multiple other companies to include this kit in their products as well is just beyond stupid for putting in writing. "Hey Zuck, I have an idea on your proposal. We should get together to discuss in person" would be suspect, but at least it's not incriminating. It's like these people have never seen a movie, or read a news article on other companies getting caught.
By @afavour - 6 months
Not to downplay it but at least this requires users to download the Onavo app, which isn’t so common.

The one that I wonder about a lot is this: there are two (non-deprecated) types of webview you can use in iOS: WKWebview and SFSafariViewController. They’re intended for very different uses.

When you tap on a link in the Facebook app they should use SFSafariViewController. It’s private (app code has no visibility into it), it shares cookies with Safari, it’s literally intended for “load some external web content within the context of this app”

Instead, FB still uses WKWebView. With that you can inject arbitrary JS into any page you want. Track navigations, resources loaded, the works. Given the revelations we’ve seen in this article and many others I shudder to imagine what FB is doing with those capabilities. They’re probably tracking user behavior on external sites down to every tap on every pixel. It seems insane to think they might be tracking every username and password entered in their in-app webviews but they have the technical capability to. And do we really trust that they wouldn’t?

By @xbmcuser - 6 months
I don't know why but Facebook is the one tech company that I just can't have a good opinion about. I like and dislike Google, Microsoft, Apple, NvidiA, AMD, Intel and the rest for different things but I just hate Facebook. I closed my facebook account about 10-11 years back put a filter to keep facebook out of my search results. And I have to say it works I rarely see anything about Facebook on my Google news feeds etc. I still use WhatsApp though as that is the biggest communication app outside China in Asia
By @1vuio0pswjnm7 - 6 months
"There is a current class action lawsuit against Meta in which court documents include claims that the company had breached the Wiretap Act."

This is not a wiretapping case. The claims are all for violations of the Sherman Act. Plaintiffs' attorneys _incidentally_ found evidence during discovery that Facebook may have breached the Wiretap Act. There are no wiretapping claims. It is an antitrust case.

By @bschne - 6 months
I think a relative of mine once almost signed up for another market research thing that would have done essentially this, redirecting all their phone's internet traffic through a VPN & proxy controlled by the market research company, including installing their Cert. They would have received some small compensation for it, and of course consented to having it installed. I don't recall the company being misleading about anything, exactly. That being said, while I generally am not in favor of overly paternalistic policies, I wonder how meaningful the consent of someone with relatively little technical knowledge for something like this really is. They were not misleading about things, but also didn't fully spell things in a way that would really drive home what was going on for someone unaware.
By @giancarlostoro - 6 months
Reading this article I'm just thinking that Facebook has wing that's just an NSA front at this point.
By @egberts1 - 6 months
Ooooooooh, SSLbump.

There has to be a court precedent that criminalized sniffing network traffic on the customer’s side.

Should be one of those many cases involving wiretapping for banking info.

By @egberts1 - 6 months
This is why we should be doing dual-server-client TLS certificate exchange before stuffing damaging info over Internet. But, alas, nooooooooo.
By @musha68k - 6 months
Unfortunately this is unsurprising; with bad actors like Meta there are likely many potential "dark patterns" put in place.

I can imagine e.g. security risks involving sensor data exfiltration where accelerometers and gyroscopes etc are monitored to infer audio information. By covertly relaying and processing the collected data externally it would be possible to reconstruct sensitive information without direct access to the device's microphone.

It's not unlikely that they pull off something like that.

Meta and other pernicious companies and government bodies are probably employing many more, even worse and much simpler eavesdropping techniques in the wild.

By @RockRobotRock - 6 months
"Stay safer when you're using public Wi-Fi. Turn Protection On"

prompt to install a VPN config

Fuck yourself, Facebook.

By @rkagerer - 6 months
Why would anyone use a VPN service provided by Facebook?
By @webninja - 6 months
Isn’t this what the broad CFAA was created for and what Aaron Schwartz was martyred over?
By @Ethicalhackers - 6 months
Yes, it can be possible. I stormbound a with a friend who recommend hire a professional team who provide me access her phone through spy app i install on my phone it work like a magic. I advice you use this team know as hireprohackers20@Gmail.com for your won job to be handle
By @Crazyontap - 6 months
Why didn't a big company like Snapchat not have certificate pinning? Something is amiss here!?
By @temp0728 - 6 months
I used to work for a startup that collected data by using MITM attack with a VPN server, and other means. The users got paid a small sum of money to participate.
By @ARandomerDude - 6 months
If you or I did this, we would already be in jail for phishing plus whatever add-on charges the Feds could file.

Meta has Washington in their pocket so this will never leave civil court. The penalty will be less than the money made, meaning somebody gets a bonus for being creative.

By @FragrantRiver - 6 months
This wouldn't have happened if Android used Javascript.
By @exmicrosoldier - 6 months
They do this on my work laptop. Zscaler
By @lowermidmgmt - 6 months
If there is a god we'll be compensated through a class action settlement for a $5 meta ad voucher.
By @29athrowaway - 6 months
tl;dr: They acquired an app called Onavo, with 10 million customers, and used it to install a CA certiticate thus allowing them to act as a MITM proxy.
By @walrus01 - 6 months
tl;dr: If you install and fully trust a root CA on your client device, of course your TLS traffic can be MITMed.

edit: the problem, obviously, is that this app tricked the non-technical people into installing/trusting the root CA for malicious purposes. Clearly this was malware.