← Explore·

#mobileforensics

Public entries tagged #mobileforensics

swipe to read

Signal vs Wire — binary analysis of both APKs (apktool, strings, ELF inspection).

The gap is larger than most people think:

Signal: Rust core (libsignal_jni.so), Kyber-1024 post-quantum hybrid ratchet, SQLCipher for at-rest encryption, SVR with Intel SGX attestation, IME_FLAG_NO_PERSONALIZED_LEARNING (keyboard can't index your messages), zero third-party trackers.

Wire: Kotlin/Ktor, no hardened native core (more accessible to Frida), no SQLCipher (messages extractable in plaintext on rooted devices), no post-quantum, Segment SDK for behavioural telemetry.

But the finding that surprised me most:

Wire APKs from unofficial stores (Uptodown et al.) contain additional tracking workers and ACCESS_SUPERUSER permission requests not present in the official build. Supply chain integrity is not a footnote — it's the threat model.

Conclusion: Signal is the only one of the two suitable for threat models involving physical or administrative device compromise.

soon the full paper

Signal vs Wire — two boxers representing the security comparison between the two messaging apps.
00

Releasing — Greyware Analysis and Mitigation Approach.

Not a malware scanner. Not a clean-room tool. Built specifically for the grey area: apps that aren't malicious but collect, exfiltrate, and evade in ways users never agreed to.

4 open source tools:
• gama-intel — automated static analysis pipeline, STIX 2.1 output
• gama-framework — interactive analyst workspace, 7-phase methodology
• gama-deep — three-channel MLP anomaly scoring (static + smali + network), no CUDA required
• gama-community — shared confirmed findings DB (coming soon)

First confirmed finding: CENT-2026-001 — Mintegral MBridge SDK.

gama.centurialabs.pl
github.com/psychomad/gama

00
12

Subscribe to #mobileforensics entries via RSS feed