PLAY PODCASTS
On the Effectiveness of Time Travel to Inject COVID-19 Alerts (rc3)

On the Effectiveness of Time Travel to Inject COVID-19 Alerts (rc3)

Chaos Computer Club - archive feed · Martin Vuagnoux, Vincenzo Iovino, Serge Vaudenay

December 29, 202031m 43s

Audio is streamed directly from the publisher (cdn.media.ccc.de) as published in their RSS feed. Play Podcasts does not host this file. Rights-holders can request removal through the copyright & takedown page.

Show Notes

We build a time machine to inject (in 20 seconds) false alerts in Google Apple Exposure Notification apps such as Corona-Warn-App, Immuni, SwissCovid, etc. Digital contact tracing apps allow to alert people who have been in contact with people who may be contagious. The Google Apple Exposure Notification (EN) system is based on Bluetooth proximity estimation. It has been adopted by many countries around the world. However, many possible attacks are known. The goal of some of them is to inject a false alert on someone else's phone. This way, an adversary can eliminate a competitor in a sport event or a business in general. Political parties can also prevent people from voting. In this talk, we review several methods to inject false alerts. One of them requires to corrupt the clock of the smartphone of the victim. For that, we build a time-traveling machine to be able to remotely set up the clock on a smartphone and experiment our attack. We show how easy this can be done. We successfully tested several smartphones with the German app (Corona-Warn-App), the Italian app (Immuni), the Swiss app (SwissCovid), etc. about this event: https://pretalx.rc3.studio/rc3-channels-2020/talk/V8ST3P/

Topics

rc3-cbase562020c-base