

This is a remarkable shortcoming because ephemeral keys should never be able to authenticate a user.

Two of the vulnerabilities require no special access to a Threema server or app to cryptographically impersonate a user.

Researchers from the Zurich-based ETH research university reported on Monday that they found seven vulnerabilities in Threema that seriously call into question the true level of security the app has offered over the years. The app uses a custom-designed encryption protocol in contravention of established cryptographic norms. It’s among the top Android apps for a fee-based category in Switzerland, Germany, Austria, Canada, and Australia. Threema developers advertise it as a more secure alternative to Meta’s WhatsApp messenger. Threema has more than 10 million users, which include the Swiss government, the Swiss army, German Chancellor Olaf Scholz, and other politicians in that country. Despite the unusually strong claims and two independent security audits Threema has received, the researchers said the flaws completely undermine assurances of confidentiality and authentication that are the cornerstone of any program sold as providing end-to-end encryption, typically abbreviated as E2EE. Academic researchers have discovered serious vulnerabilities in the core of Threema, an instant messenger that its Switzerland-based developer says provides a level of security and privacy “no other chat service” can offer.
