Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

EBID contain user/phone ID #64

Open
pfif opened this issue Jun 6, 2020 · 0 comments
Open

EBID contain user/phone ID #64

pfif opened this issue Jun 6, 2020 · 0 comments

Comments

@pfif
Copy link

pfif commented Jun 6, 2020

Problem : All EBID (ID sent by bluetooth) contain an encrypted
version of the phone's ID. The key1 used to encrypt the EBID is
stored on the server.

Here is an attack vector: a malicious actor sets up a computer that
records all the EBID broadcasted from the phone. It then manage to
obtain the key/keys used by the server to encrypt the EBID2, and
decrypt them all. The malicious user will then have a record of all
the user ID that came near that hub.

Possible solution?: Have EBID be random strings, and store these in a
map EBID -> ID. A trie data structure might also be used in order to make
the retrival of an ID for an EBID among 86 400 000 0003 fast?

1 Maybe that key is rotated, maybe not, it's not specified.

2 Not that far fetch an idea when you consider the amount of hacks and password leaks in recent years. It could also be a malicious state actor getting to power.

3 (one key for every quarters over two week, for 30 000 000 users)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant