Nokia, the cellphone manufacturer, has been listening in to all encrypted communications from its handset’s browser. Every connection advertised as secure – banking, social networks, dating, corporate secrets – has been covertly wiretapped by Nokia themselves and decrypted for analysis.
Security researcher Gaurang Pandya posted an article in December about some unexpected behavior with their Nokia handset. It would appear that the browser traffic from the handset would get diverted through Nokia’s servers.
Then, a followup article on January 9 dropped the bomb, and the article goes into quite technical detail: It wasn’t enough that Nokia diverted all traffic from its handsets through its own servers, it also decrypted the encrypted traffic, re-encrypting it before passing it on, issuing HTTPS certificates on the fly that the Nokia phone has been instructed to trust as secure.
This means that Nokia has deliberately been wiretapping all traffic that has been advertised as encrypted on these Nokia handsets – including but not limited to banking, dating, credit card numbers, and corporate secrets – and looking at your secrets in cleartext.
This means that Nokia puts itself between your bank and you, and presents itself as YourBank, Inc. to your phone. This wouldn’t normally be possible, if it weren’t for the fact that the phone had been specifically designed for this deceptive behavior, by installing a Nokia signing certificate on the phone.
Nokia has confirmed this behavior in correspondence with TechWeek Europe (my highlights):
“The compression that occurs within the Nokia Xpress Browser means that users can get faster web browsing and more value […blahblah…] when temporary decryption of HTTPS connections is required on our proxy servers, to transform and deliver users’ content, it is done in a secure manner”, a Nokia spokesperson told TechWeek Europe.
The issue affects at least the Nokia handsets with Nokia’s own browser, the Nokia Xpress Browser mentioned above.
So why is this a big deal?
It is a big deal because banks rely on having a secure connection all the way to you. As do corporate networks. As do news outlets’ protection of sources. Anybody listening in to the conversation in the middle breaks the whole concept of secrecy – and the phone was specifically designed by Nokia to allow Nokia to listen in without telling you.
My, my. Secure connections are presenting themselves as secure end-to-end, and a handset manufacturer breaches this most basic of trusts? We’d have a very hard time trusting a company that says “yes, we’re listening to all of your encrypted communications, yes, bank passwords and dating habits and all of it, but we’re not doing anything bad with it. No, really.”
If Nokia was in trouble over its handset sales already, this complete breach of trustworthiness has to be a death twitch.
[obsolete with Update 2]
UPDATE 2: Well, that was fast. Pandya has updated his original article where he discovered this so-called Man-in-the-Middle attack, stating that Nokia has pushed out a new version of their browser which removes the Man-in-the-Middle attack – the wiretapping of encrypted communications – from the browser’s behavior. Apparently, it took being caught with the hand in the cookie jar to stop this behavior in just hours.
You still have to remind yourself, though – if they can turn this wiretapping off with a simple browser update after having been discovered doing it, there’s not much stopping Nokia from turning it on just as silently again at some point in the future, is there?