How did Facebook intercept their competitor's encrypted mobile app traffic?
Facebook faces a class action lawsuit for allegedly intercepting encrypted traffic from the Onavo Protect app, violating the Wiretap Act through a man-in-the-middle attack to monitor competitors' data.
Read original articleFacebook is currently facing a class action lawsuit alleging that it intercepted encrypted traffic from users of the Onavo Protect app, which it acquired in 2013. The lawsuit claims that Facebook violated the Wiretap Act by employing a technique known as "ssl bump," a form of man-in-the-middle (MITM) attack, to decrypt users' HTTPS traffic. This method involved prompting users to install a certificate authority (CA) certificate issued by "Facebook Research" on their devices, allowing Facebook to monitor traffic to specific domains, including those of competitors like Snapchat, YouTube, and Amazon.
Court documents indicate that the Onavo Protect app contained code to facilitate this interception, and older versions of the app included embedded CA certificates. However, improvements in Android's security measures over time made this interception increasingly difficult. The lawsuit highlights concerns about the ethical implications of using accessibility features for competitive advantage, as well as the legality of intercepting encrypted communications without user consent.
Facebook's motivation for this strategy appears to stem from a desire for "reliable analytics" on competitors, with Mark Zuckerberg emphasizing the need for detailed insights into user behavior. Despite the app being shut down in 2019 following scrutiny, the investigation into its practices continues, raising questions about the legality and ethics of Facebook's data collection methods. The outcome of the lawsuit could have significant implications for the company's practices and user privacy.
Related
Shopping app Temu is "dangerous malware," spying on your texts, lawsuit claims
Arkansas AG sues Temu app for alleged data theft and privacy breaches, accusing it of sharing sensitive user data with China. Temu denies claims and plans to defend against lawsuit. Relocation to Ireland noted.
Facebook and Instagram's 'pay or consent' ad model violates the DMA, says the EU
The European Union charges Meta for violating Digital Markets Act with its ad model lacking a data-saving option. Meta faces potential fines up to $13.4 billion. Second DMA charge after Apple's.
FTC finds 'dark patterns' used by a majority of subscription apps and websites
The FTC study reveals most subscription apps and websites employ manipulative "dark patterns" affecting user privacy and behavior. Findings prompt increased FTC scrutiny on consumer fraud amid ongoing industry deception concerns.
Apple beats lawsuit over forcing developers to use its closed ecosystem (webkit)
Apple successfully defended against a lawsuit alleging forced ecosystem use. Plaintiffs lacked legal standing. Case outcome may influence future Apple ecosystem practice cases. None.
Israel tried to frustrate US lawsuit over Pegasus spyware, leak suggests
Leaked documents reveal the Israeli government obstructed a US lawsuit against NSO Group over its Pegasus spyware, seizing internal files and coordinating with NSO to limit information shared with WhatsApp.
- Many commenters question the ethics of user consent, suggesting that participants may not fully understand the implications of their actions.
- There is skepticism about the legality of Facebook's actions, with some arguing that if individuals did the same, they would face severe legal consequences.
- Concerns are raised about Facebook's technical capabilities and potential misuse of user data, particularly regarding tracking and monitoring.
- Some commenters express a general distrust of Facebook as a company, highlighting a negative perception compared to other tech firms.
- Several users mention the broader implications of such practices, suggesting that they could lead to more significant privacy violations and security risks.
The way most of the writeups make it sound is that it’s some sort of hack, but this doesn’t seem to be the case. (I’d love to get more detail on exactly what the participants were told they were getting paid for, but I’d be surprised if they did not know their actions were being monitored.)
The accusation that it’s wiretapping if one party in the communication channel is actively breaking the encryption (even with a tool provided by a third party) seems tenuous to me, but IANAL. If this is wiretapping, is it also wiretapping for me to use a local SSL proxy to decrypt and analyze traffic to a service’s API?
The one that I wonder about a lot is this: there are two (non-deprecated) types of webview you can use in iOS: WKWebview and SFSafariViewController. They’re intended for very different uses.
When you tap on a link in the Facebook app they should use SFSafariViewController. It’s private (app code has no visibility into it), it shares cookies with Safari, it’s literally intended for “load some external web content within the context of this app”
Instead, FB still uses WKWebView. With that you can inject arbitrary JS into any page you want. Track navigations, resources loaded, the works. Given the revelations we’ve seen in this article and many others I shudder to imagine what FB is doing with those capabilities. They’re probably tracking user behavior on external sites down to every tap on every pixel. It seems insane to think they might be tracking every username and password entered in their in-app webviews but they have the technical capability to. And do we really trust that they wouldn’t?
This is not a wiretapping case. The claims are all for violations of the Sherman Act. Plaintiffs' attorneys _incidentally_ found evidence during discovery that Facebook may have breached the Wiretap Act. There are no wiretapping claims. It is an antitrust case.
There has to be a court precedent that criminalized sniffing network traffic on the customer’s side.
Should be one of those many cases involving wiretapping for banking info.
I can imagine e.g. security risks involving sensor data exfiltration where accelerometers and gyroscopes etc are monitored to infer audio information. By covertly relaying and processing the collected data externally it would be possible to reconstruct sensitive information without direct access to the device's microphone.
It's not unlikely that they pull off something like that.
Meta and other pernicious companies and government bodies are probably employing many more, even worse and much simpler eavesdropping techniques in the wild.
prompt to install a VPN config
Fuck yourself, Facebook.
Meta has Washington in their pocket so this will never leave civil court. The penalty will be less than the money made, meaning somebody gets a bonus for being creative.
edit: the problem, obviously, is that this app tricked the non-technical people into installing/trusting the root CA for malicious purposes. Clearly this was malware.
Related
Shopping app Temu is "dangerous malware," spying on your texts, lawsuit claims
Arkansas AG sues Temu app for alleged data theft and privacy breaches, accusing it of sharing sensitive user data with China. Temu denies claims and plans to defend against lawsuit. Relocation to Ireland noted.
Facebook and Instagram's 'pay or consent' ad model violates the DMA, says the EU
The European Union charges Meta for violating Digital Markets Act with its ad model lacking a data-saving option. Meta faces potential fines up to $13.4 billion. Second DMA charge after Apple's.
FTC finds 'dark patterns' used by a majority of subscription apps and websites
The FTC study reveals most subscription apps and websites employ manipulative "dark patterns" affecting user privacy and behavior. Findings prompt increased FTC scrutiny on consumer fraud amid ongoing industry deception concerns.
Apple beats lawsuit over forcing developers to use its closed ecosystem (webkit)
Apple successfully defended against a lawsuit alleging forced ecosystem use. Plaintiffs lacked legal standing. Case outcome may influence future Apple ecosystem practice cases. None.
Israel tried to frustrate US lawsuit over Pegasus spyware, leak suggests
Leaked documents reveal the Israeli government obstructed a US lawsuit against NSO Group over its Pegasus spyware, seizing internal files and coordinating with NSO to limit information shared with WhatsApp.