Impersonating users of 'protest' app Bridgefy was as simple as sniffing Bluetooth handshakes for identifiers

Impersonating users of 'protest' app Bridgefy was as simple as sniffing Bluetooth handshakes for identifiers

An instant messaging app whose creators promoted it as secure and end-to-end encrypted was in fact no such thing, according to researchers at Royal Holloway.


The University of London college found, according to a paper it published yesterday, that the app "permits its users to be tracked, offers no authenticity, no effective confidentiality protections and lacks resilience against adversarially crafted messages".


As first reported by Ars Technica, Bridgefy was promoting itself earlier this year as the app of choice for protesters in Hong Kong and India to organise their activities without being easily spied upon by law enforcement agencies.


Yet Royal Holloway's Martin Albrecht, Rikke Bjerg Jensen, Jorge Blasco, and Lenka Marekova found in a security analysis [PDF] that the app " ..

Support the originator by clicking the read the rest link below.