Skip to content

Latest commit

 

History

History
5 lines (3 loc) · 659 Bytes

README.md

File metadata and controls

5 lines (3 loc) · 659 Bytes

This repository contains the code for our attack presented in the paper "Help, my Signal has bad Device! Breaking the Signal Messenger’s Post-CompromiseSecurity through a Malicious Device, to appear at DIMVA 2021.

Program.cs implements the dummy device for simulating the Signal phone app.

The implementation depends on ZXing.Net (for scanning QR codes) and libsignal-service-dotnet (for Signal API requests). The latter has been slightly fixed to make the device registration work (see patches folder).