July 29th, 2024

Not So Secret: Analysis of KakaoTalk's Chat E2EE Feature

KakaoTalk's Secret Chat feature has significant vulnerabilities, including susceptibility to man-in-the-middle attacks and lack of essential security measures. Users are advised to consider more secure alternatives like Signal.

Read original articleLink Icon
Not So Secret: Analysis of KakaoTalk's Chat E2EE Feature

The analysis of KakaoTalk's Secret Chat end-to-end encryption (E2EE) feature reveals several significant vulnerabilities. The Secret Chat option, which is not enabled by default, allows for E2EE messaging but is susceptible to man-in-the-middle (MITM) attacks. An attacker with server access could replace public keys without notifying users, enabling them to read encrypted communications. The protocol lacks essential security features such as ciphertext integrity, which means messages can be manipulated undetected, and freshness, allowing for potential replay attacks.

KakaoTalk's E2EE is opt-in, and users must manually verify public key fingerprints to ensure authenticity. The central public-key database managed by Kakao Corp. poses additional risks, as it can be exploited for MITM attacks if users do not compare keys. Furthermore, the absence of server authentication in the LOCO messaging backend raises concerns about trusting the server, which could lead to unauthorized access to sensitive information.

The analysis suggests that high-risk users should avoid using KakaoTalk's Secret Chat and opt for more secure alternatives like Signal. Users are advised to create new chat rooms for each conversation and to stop using the feature if any warning messages appear. Overall, while KakaoTalk has made efforts to provide E2EE, the existing flaws highlight the need for users to exercise caution and consider more robust messaging platforms.

Link Icon 5 comments
By @tamimio - 4 months
> Use a more robust E2EE chat app instead (e.g., Signal). Ideally, run your own messaging server if you can (e.g., Signal server).

If you are more serious about security and privacy, don’t use an app that still uses a broken protocol (SMS) that’s vulnerable to different types of attacks as your main ID. Use Matrix or similar instead.

By @upofadown - 4 months
>In addition, KakaoTalk does not immediately notify users if the other parties’ public key has changed...

The suggested alternative (Signal) at one point changed such warnings so that that they are much easier to miss and/or ignore[1]. They are now shown in tiny light grey text and the user no longer has to acknowledge the warning at all. So not a great counterexample...

It seems that these type of things go through a natural evolution. First security at the expense of usability and then later usability at the expense of security. We really need to come to terms with the hard problem of E2EE usability rather than continue to engage in this constant waffling...

[1] https://signal.org/blog/verified-safety-number-updates/

By @future10se - 4 months
Thanks for this! Some feedback on the images: perhaps you can "bake-in" a white background. Your diagrams are transparent PNGs, which is fine when the webpage is white, but when in dark mode it makes the images hard to read (as now we have black text and drawings against a dark background).
By @dnpp123 - 4 months
Good article. I'd say the broader points here are:

- the old adage "don't roll out your own cryptography" (even if you're one of the biggest conglomerate in one of the world's wealthiest country).

- not a single person I know use this secret chat feature - it's sadly still quite rare in Korea to meet a privacy minded person even (especially?) in tech-focused groups, people use Telegram (which might be worst)