Abstract
Mesh messaging applications allow users in relative proximity to communicate without the Internet. The most viable offering in this space, Bridgefy, has recently seen increased uptake in areas experiencing large-scale protests (Hong Kong, India, Iran, US, Zimbabwe, Belarus), suggesting its use in these protests. It is also being promoted as a communication tool for use in such situations by its developers and others. In this work, we report on a security analysis of Bridgefy. Our results show that Bridgefy, as analysed, permitted its users to be tracked, offered no authenticity, no effective confidentiality protections and lacked resilience against adversarially crafted messages. We verified these vulnerabilities by demonstrating a series of practical attacks on Bridgefy. Thus, if protesters relied on Bridgefy, an adversary could produce social graphs about them, read their messages, impersonate anyone to anyone and shut down the entire network with a single maliciously crafted message.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
As we discuss in Sect. 2.4, alternatives to Bridgefy are scarce, making it the predominant example of such an application/framework.
- 2.
Available at https://eprint.iacr.org/2021/214.
- 3.
This is facilitated by the dump flag in ForwardTransaction, but we omit this exchange in the figure as it is not relevant to the actual handshake protocol.
- 4.
We had omitted details of the Bridgefy architecture, as the attacks had not been mitigated at that point in time.
References
Bridgefy, April 2020. https://web.archive.org/web/20200411143157/www.bridgefy.me/
Adomnicai, A., Fournier, J.J.A., Masson, L.: Hardware security threats against Bluetooth mesh networks. In: 2018 IEEE Conference on Communications and Network Security, CNS 2018, Beijing, China, 30 May–1 June 2018, pp. 1–9. IEEE (2018). https://doi.org/10.1109/CNS.2018.8433184
Álvarez, F., Almon, L., Hahn, A., Hollick, M.: Toxic friends in your network: breaking the Bluetooth Mesh friendship concept. In: Mehrnezhad, M., van der Merwe, T., Hao, F. (eds.) Proceedings of the 5th ACM Workshop on Security Standardisation Research Workshop, London, UK, 11 November 2019, pp. 1–12. ACM (2019). https://doi.org/10.1145/3338500.3360334
Alwen, J., et al.: Keep the dirt: Tainted TreeKEM, an efficient and provably secure continuous group key agreement protocol. Cryptology ePrint Archive, Report 2019/1489 (2019). https://eprint.iacr.org/2019/1489
Alwen, J., Coretti, S., Dodis, Y., Tselekounis, Y.: Security analysis and improvements for the IETF MLS standard for group messaging. Cryptology ePrint Archive, Report 2019/1189 (2019). https://eprint.iacr.org/2019/1189
Aviram, N., et al.: DROWN: breaking TLS using SSLv2. In: Holz, T., Savage, S. (eds.): USENIX Security 2016, pp. 689–706. USENIX Association, August 2016
Bardou, R., Focardi, R., Kawamoto, Y., Simionato, L., Steel, G., Tsay, J.-K.: Efficient padding oracle attacks on cryptographic hardware. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 608–625. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-32009-5_36
BBC News: Iraqis use FireChat messaging app to overcome net block, June 2014. http://web.archive.org/web/20190325080943/https://www.bbc.com/news/technology-27994309k
Becker, J.K., Li, D., Starobinski, D.: Tracking anonymized Bluetooth devices. In: Proceedings on Privacy Enhancing Technologies, vol. 2019, no. 3, pp. 50–65 (2019)
Bhavani, D.K.: Internet shutdown? Why Bridgefy app that enables offline messaging is trending in India, December 2019. http://web.archive.org/web/20200105053448/https://www.thehindu.com/sci-tech/technology/internet-shutdown-why-bridgefy-app-that-enables-offline-messaging-is-trending-in-india/article30336067.ece
Bland, A.: FireChat - the messaging app that’s powering the Hong Kong protests, September 2014. http://web.archive.org/web/20200328142327/https://www.theguardian.com/world/2014/sep/29/firechat-messaging-app-powering-hong-kong-protests
Bleichenbacher, D.: Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 1–12. Springer, Heidelberg (1998). https://doi.org/10.1007/BFb0055716
Bluetooth SIG: Core specification 5.1, January 2019. https://www.bluetooth.com/specifications/bluetooth-core-specification/
Böck, H., Somorovsky, J., Young, C.: Return of Bleichenbacher’s oracle threat (ROBOT). In: Enck, W., Felt, A.P. (eds.) USENIX Security 2018, pp. 817–849. USENIX Association, August 2018
Borak, M.: We tested a messaging app used by Hong Kong protesters that works without an internet connection, September 2019. http://web.archive.org/web/20191206182048/https://www.abacusnews.com/digital-life/we-tested-messaging-app-used-hong-kong-protesters-works-without-internet-connection/article/3025661
Boyle, G.: 20 Years of Bleichenbacher attacks. Technical Reports RHUL-ISG-2019-1. Information Security Group, Royal Holloway University of London (2019)
Brewster, T.: Hong Kong protesters are using this ‘mesh’ messaging app–but should they trust it? September 2019. http://web.archive.org/web/20191219071731/https://www.forbes.com/sites/thomasbrewster/2019/09/04/hong-kong-protesters-are-using-this-mesh-messaging-app-but-should-they-trust-it/
Bridgefy: Developers (2018). https://blog.bridgefy.me/developers.html, https://archive.vn/yjg9f
Bridgefy: Bridgefy’s commitment to privacy and security, August 2020. http://web.archive.org/web/20200826183604/https://bridgefy.me/bridgefys-commitment-to-privacy-and-security/
Bridgefy: Offline messaging, April 2020. https://web.archive.org/20200411143133/play.google.com/store/apps/details?id=me.bridgefy.main
Bridgefy: Technical article on our security updates, November 2020. http://web.archive.org/web/20201102093540/https://bridgefy.me/technical-article-on-our-security-updates/
Cortés, V.: Bridgefy sees massive spike in downloads during Hong Kong protests, August 2019. http://web.archive.org/web/20191013072633/www.contxto.com/en/mexico/mexican-bridgefy-sees-massive-spike-in-downloads-during-hong-kong-protests/
Cremers, C., Hale, B., Kohbrok, K.: Efficient post-compromise security beyond one group. Cryptology ePrint Archive, Report 2019/477 (2019). https://eprint.iacr.org/2019/477
Dunning, J.P.: Taming the blue beast: a survey of Bluetooth based threats. IEEE Secur. Priv. 8(2), 20–27 (2010). https://doi.org/10.1109/MSP.2010.3
Duong, T., Rizzo, J.: The CRIME attack. Presentation at Ekoparty Security Conference (2012)
Ermoshina, K., Halpin, H., Musiani, F.: Can Johnny build a protocol? Co-ordinating developer and user intentions for privacy-enhanced secure messaging protocols. In: 2nd IEEE European Symposium on Security and Privacy (EuroS&P 2017) (2017)
Fifield, D.: A better zip bomb. In: 13th USENIX Workshop on Offensive Technologies (WOOT 2019), Santa Clara. USENIX Association, August 2019
Frida: A dynamic instrumentation framework, v12.8.9, February 2020. https://frida.re/
Furuhashi, S.: MessagePack (2008). https://msgpack.org/
Gardner-Stephen, P.: The Serval Project (2017). http://www.servalproject.org/
Garman, C., Green, M., Kaptchuk, G., Miers, I., Rushanan, M.: Dancing on the lip of the volcano: chosen ciphertext attacks on Apple iMessage. In: Holz, T., Savage, S. (eds.): USENIX Security 2016, pp. 655–672. USENIX Association, August 2016
Gluck, Y., Harris, N., Prado, A.: BREACH: reviving the CRIME attack. Black Hat USA (2013)
Goodin, D.: Bridgefy, the messenger promoted for mass protests, is a privacy disaster, August 2020. https://arstechnica.com/features/2020/08/bridgefy-the-app-promoted-for-mass-protests-is-a-privacy-disaster/
Halpin, H., Ermoshina, K., Musiani, F.: Co-ordinating developers and high-risk users of privacy-enhanced secure messaging protocols. In: Cremers, C., Lehmann, A. (eds.) SSR 2018. LNCS, vol. 11322, pp. 56–75. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-04762-7_4
Hassan, S.S., Bibon, S.D., Hossain, M.S., Atiquzzaman, M.: Security threats in Bluetooth technology. Comput. Secur. 74, 308–322 (2018). https://doi.org/10.1016/j.cose.2017.03.008
HypeLabs: The Hype SDK: a technical overview (2019). https://hypelabs.io/documents/Hype-SDK.pdf
HypeLabs (2020). https://hypelabs.io
IETF: DEFLATE compressed data format specification version 1.3, May 1996. https://tools.ietf.org/html/rfc1951
IETF: GZIP file format specification version 4.3, May 1996. https://tools.ietf.org/html/rfc1952
IETF: PKCS #1: RSA encryption version 1.5, March 1998. https://tools.ietf.org/html/rfc2313
Jasek, S.: GATTacking Bluetooth smart devices (2016). https://github.com/securing/docs/raw/master/whitepaper.pdf
Josh Horwitz, T.i.A.: Unblockable? Unstoppable? FireChat messaging app unites China and Taiwan in free speech\(\ldots \) and it’s not pretty, March 2014. http://web.archive.org/web/20141027180653/https://www.techinasia.com/unblockable-unstoppable-firechat-messaging-app-unites-china-and-taiwan-in-free-speech-and-its-not-pretty/
Kelsey, J.: Compression and information leakage of plaintext. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol. 2365, pp. 263–276. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45661-9_21
Klíma, V., Pokorný, O., Rosa, T.: Attacking RSA-based sessions in SSL/TLS. In: Walter, C.D., Koç, Ç.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 426–440. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-45238-6_33
Koetsier, J.: Hong Kong protestors using mesh messaging app China can’t block: usage up 3685%, September 2019. https://web.archive.org/web/20200411154603/www.forbes.com/sites/johnkoetsier/2019/09/02/hong-kong-protestors-using-mesh-messaging-app-china-cant-block-usage-up-3685/
Magaisa, A.T.: https://twitter.com/wamagaisa/status/1288817111796797440. http://archive.today/DVRZf, July 2020
Mihindukulasuriya, R.: FireChat, Bridgefy see massive rise in downloads amid internet shutdowns during CAA protests, December 2019. http://web.archive.org/web/20200109212954/https://theprint.in/india/firechat-bridgefy-see-massive-rise-in-downloads-amid-internet-shutdowns-during-caa-protests/340058/
Mohan, P.: How the internet shutdown in Kashmir is splintering India’s democracy, March 2020. http://web.archive.org/web/20200408111230/https://www.fastcompany.com/90470779/how-the-internet-shutdown-in-kashmir-is-splintering-indias-democracy
Mudzingwa, F.: This offline messenger that might keep you connected if the govt decides to shut down the internet, August 2020. https://web.archive.org/web/20200816101930/www.techzim.co.zw/2020/07/bridgefy-is-an-offline-messenger-that-might-keep-you-connected-if-the-govt-decides-to-shut-down-the-internet/
News, H.: Hong Kong protestors using Bridgefy’s Bluetooth-based mesh network messaging app, August 2019. https://web.archive.org/web/20191016114954/news.ycombinator.com/item?id=20861948
Ng, B.: Bridgefy: a startup that enables messaging without internet, August 2019. http://archive.today/2020.06.07-120425/https://www.ejinsight.com/eji/article/id/2230121/20190826-bridgefy-a-startup-that-enables-messaging-without-internet
Open Garden: FireChat, October 2019. http://web.archive.org/web/20200111174316/https://www.opengarden.com/firechat/
Open Mesh: B.A.T.M.A.N. Advanced (2020). https://www.open-mesh.org/projects/batman-adv/wiki
Purohit, K.: Whatsapp to Bridgefy, what Hong Kong taught India’s leaderless protesters, December 2019. http://web.archive.org/web/20200406103939/https://www.scmp.com/week-asia/politics/article/3042633/whatsapp-bridgefy-what-hong-kong-taught-indias-leaderless
Rogers, M., Saitta, E., Grote, T., Dehm, J., Wieder, B.: Briar, March 2018. https://web.archive.org/web/20191016114519/briarproject.org/
Ryan, M.: Bluetooth: with low energy comes low security. In: Proceedings of the 7th USENIX Conference on Offensive Technologies (WOOT 2013), p. 4. USENIX Association, USA (2013)
Schwartz, L.: The world’s protest app of choice, August 2020. https://restofworld.org/2020/the-worlds-protest-app-of-choice/, http://archive.today/5kOhr
SIG, B.: Mesh profile specification 1.0.1, January 2019. https://www.bluetooth.com/specifications/mesh-specifications/
Silva, M.D.: Hong Kong protestors are once again using mesh networks to preempt an internet shutdown, September 2019. http://archive.today/2019.09.20-220517/https://qz.com/1701045/hong-kong-protestors-use-bridgefy-to-preempt-internet-shutdown/
Sivakumaran, P., Blasco, J.: A study of the feasibility of co-located app attacks against BLE and a large-scale analysis of the current application-layer security landscape. In: Heninger, N., Traynor, P. (eds.) USENIX Security 2019, pp. 1–18. USENIX Association, August 2019
Skylot: Jadx - Dex to Java decompiler, v1.1.0, December 2019. https://github.com/skylot/jadx
SMEX: Lebanon protests: how to communicate securely in case of a network disruption, October 2019. https://smex.org/lebanon-protests-how-to-communicate-securely-in-case-of-a-network-disruption-2/, http://archive.today/hx1lp
Software Freedom Law Centre, India: Internet shutdown tracker (2020). https://internetshutdowns.in/
Stein, W., et al.: Sage mathematics software version 9.0. The Sage Development Team (2019). http://www.sagemath.org
Subnodes: Subnodes (2018). http://subnodes.org/
Sullivan, N., Turner, S., Kaduk, B., Cohn-Gordon, K., et al.: Messaging Layer Security (MLS), November 2018. https://datatracker.ietf.org/wg/mls/about/
Teknologiia Lebanon: Lebanese protesters are using this ‘Bridgefy’ messaging app – what is it? January 2020. https://medium.com/@teknologiialb/lebanese-protesters-are-using-this-bridgefy-messaging-app-what-is-it-74614e169197, https://archive.vn/udqly
The Stranger: How to message people at protests even without internet access, June 2020. https://www.thestranger.com/slog/2020/06/03/43829749/how-to-message-people-at-protests-even-without-internet-access, http://archive.is/8UrWQ
Twitter: Bridgefy search, June 2020. https://twitter.com/search?q=bridgefy, http://archive.today/hwklY
Twitter - B1O15J, August 2020. https://twitter.com/B1O15J/status/1294603355277336576, https://archive.vn/dkPqD
Twitter - Bridgefy, November 2019. https://twitter.com/bridgefy/status/1197191632665415686, http://archive.today/aNKQy
Twitter - Bridgefy, December 2019. https://twitter.com/bridgefy/status/1209924773486170113, http://archive.today/aQZDL
Twitter - Bridgefy, January 2020. https://twitter.com/bridgefy/status/1216473058753597453, http://archive.today/x1gG4
Twitter - Bridgefy, June 2020. https://twitter.com/bridgefy/status/1268905414248153089. http://archive.today/odSbW
Twitter - Bridgefy, July 2020. https://twitter.com/bridgefy/status/1287768436244983808, https://archive.vn/WQfZm
Twitter - Bridgefy, June 2020. https://twitter.com/bridgefy/status/1268015807252004864, http://archive.today/uKNRm
Twitter - Bridgefy, August 2020. https://twitter.com/bridgefy/status/1289576487004168197, https://archive.vn/zbxgR
Twitter - Bridgefy, August 2020. https://twitter.com/bridgefy/status/1292880821725036545, https://archive.vn/tKr0t
Twitter - Bridgefy, June 2020. https://twitter.com/bridgefy/status/1267469099266965506, http://archive.today/40pzC
Uher, J., Mennecke, R.G., Farroha, B.S.: Denial of sleep attacks in Bluetooth Low Energy wireless sensor networks. In: Brand, J., Valenti, M.C., Akinpelu, A., Doshi, B.T., Gorsic, B.L. (eds.) 2016 IEEE Military Communications Conference, MILCOM 2016, Baltimore, MD, USA, 1–3 November 2016, pp. 1231–1236. IEEE (2016). https://doi.org/10.1109/MILCOM.2016.7795499
Wakefield, J.: Hong Kong protesters using Bluetooth Bridgefy app, September 2019. http://web.archive.org/web/20200305062625/https://www.bbc.co.uk/news/technology-49565587
Zuo, C., Wen, H., Lin, Z., Zhang, Y.: Automatic fingerprinting of vulnerable BLE IoT devices with static UUIDs from mobile apps. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 1469–1483. ACM (2019)
Acknowledgements
Part of this work was done while Albrecht was visiting the Simons Institute for the Theory of Computing. The research of Mareková was supported by the EPSRC and the UK Government as part of the Centre for Doctoral Training in Cyber Security at Royal Holloway, University of London (EP/P009301/1). We thank Kenny Paterson and Eamonn Postlethwaite for comments on an earlier version of this paper.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Albrecht, M.R., Blasco, J., Jensen, R.B., Mareková, L. (2021). Mesh Messaging in Large-Scale Protests: Breaking Bridgefy. In: Paterson, K.G. (eds) Topics in Cryptology – CT-RSA 2021. CT-RSA 2021. Lecture Notes in Computer Science(), vol 12704. Springer, Cham. https://doi.org/10.1007/978-3-030-75539-3_16
Download citation
DOI: https://doi.org/10.1007/978-3-030-75539-3_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-75538-6
Online ISBN: 978-3-030-75539-3
eBook Packages: Computer ScienceComputer Science (R0)