back to article Israeli Android researchers demo VPN vulnerability

The Ben Gurion University security researchers who tangled with Samsung over its KitKat security implementation have posted a follow-up, in which they demonstrate how a malicious app could bypass some VPN protections in Android. Back in December, the university's Cyber Security Labs stated that Samsung's Knox implementation …

COMMENTS

This topic is closed for new posts.
  1. busycoder99

    KitKat

    is Android 4.4 not 4.3

  2. Anonymous Coward
    Anonymous Coward

    " it's important to note that it can only be exploited if a user can be tricked into installing a malicious application."

    <irony>

    And there's none of those for Android at all, right?

    </irony>

  3. Anonymous Coward
    Anonymous Coward

    Socks Proxy

    So basically all you would been to do was force all traffic over a proxy of some sort (potentially a socks proxy) which you owned regardless of if the traffic transited the vpn or native data connection and hover it all up... simples..

    ABP basically does the same on android with a local proxy to block the ads, although your better off manually patching the hosts file if you ask me... anyway moving on.

    But honestly who sets up a mobile device to use email service which doesn't use ssl or tls these days...

    Essentially all it boils down to is the told the user install x program that then asked for permissions to things it didn't need and the user clicked yes that's fine install...

    Bit of a non event if you ask me, now if they had cooked in something like ssl strip to try and snaffle up web traffic as well it would be more interesting.

    1. Anonymous Coward
      Anonymous Coward

      Re: Socks Proxy

      "Essentially all it boils down to is the told the user install x program that then asked for permissions to things it didn't need and the user clicked yes that's fine install…"

      Yeah I mean no-one ever does that

This topic is closed for new posts.

Other stories you might like