Skip to content

HT app security audit #13

@khusmann

Description

@khusmann

The HT app has service that runs on startup, and connects to rpc.benshikj.com:800.

From the decompiled app, it looks like this is used for some of the team / channel sharing features, also for getting info on firmware updates. It uses google protocol buffers for its messages. So why does it need to continuously run on startup? What is it tracking?

Another concern I have is that if you copy text into your clipboard and then navigate into the HT app, you'll get a toast notification that "HT pasted from your clipboard". That's spooky. Is it grabbing your clipboard and sending it upstream?

Unfortunately I have not been able to mitm this traffic to see what other sorts of things it sends. I think the app may use cert pinning, or it's making the TCP / SSL connection in a way that the usual tutorials don't work with.

Perhaps someone with more security experience can jump in on this front?

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions