Mobile instant messengers such as WhatsApp use delivery status notifications in order to inform users if a sent message has successfully reached its destination. This is useful and important information for the sender due to the often asynchronous use of the messenger service. However, as we demonstrate in this paper, this standard feature opens up a timing side channel with unexpected consequences for user location privacy. We investigate this threat conceptually and experimentally for three widely spread instant messengers. We validate that this information leak even exists in privacy-friendly messengers such as Signal and Threema. Our results show that, after a training phase, a messenger user can distinguish different locations of the message receiver. Our analyses involving multiple rounds of measurements and evaluations show that the timing side channel persists independent of distances between receiver locations -- the attack works both for receivers in different countries as well as at small scale in one city. For instance, out of three locations within the same city, the sender can determine the correct one with more than 80% accuracy. Thus, messenger users can secretly spy on each others' whereabouts when sending instant messages. As our countermeasure evaluation shows, messenger providers could effectively disable the timing side channel by randomly delaying delivery confirmations within the range of a few seconds. For users themselves, the threat is harder to prevent since there is no option to turn off delivery confirmations.
翻译:诸如 WhatsApp 等移动即时信使使用发送状态通知, 以便告知用户发送消息成功到达目的地时, 这对发送者来说是有用和重要的信息, 因为经常不同步地使用送信者服务。 但是, 正如我们在本文件中所显示的那样, 这个标准功能打开了一个时针侧通道, 给用户定位隐私带来意想不到的后果。 我们从概念上和实验上为三个广为传播的即时信使调查了这种威胁。 我们确认这种信息泄露甚至存在于信号和三马等隐私友好信使中。 我们的结果表明, 在培训阶段之后, 送信者可以区分信息接收者的不同地点。 我们的多轮测量和评估分析显示, 时间边频道仍然独立于接收器位置之间的距离 -- 袭击既针对不同国家的接收者,也针对一个城市的小规模。 例如,在同一城市的三个地点, 发送者可以以超过80%的准确度来确定正确的信息。 因此, 信使用户在发送即时可以秘密地监视对方的下落。 正如我们的反测量评估显示, 信使送信提供者可以有效地阻止计时端频道在几秒钟内设置危险。 。 。