OP 18 May, 2020 - 11:17 PM
This is a program for decrypting and decoding WhatsApp end-to-end encrypted media files (videos, photos, audio).
This is written in responsibe to the January 2020 story claiming Saudi Crown Prince MBS hacked the iPhone of Amazon CEO Jeff Bezos. The report said it could not decrypt the video sent by MBS to Bezos, and the phone acted strangely after receiving the video. The implication is that the video probably contained some sort of hack or virus.
However, such things can be easily decrypted. The term "end-to-end" means nobody in the middle can decrypt it, including the service provider like WhatsApp. However, those in posession of the "ends" can still decrypt it. The necessary decrypt key is, in fact, located right next to the encrypted filename within the WhatsApp database, so there's no reason why the investigators couldn't decrypt the file. All they would need is a tool -- a tool like this one.
This program doesn't simply decrypt the file, but also spits out a lot of diagnostic information about what it decoded in the file. One of the reasons the investigators were suspicious of the encrypted file was because it was slightly longer. In fact, WhatsApp encryption always adds between 11 and 26 bytes to the end of everything it encrypts, so this is not strange. This program decodes exactly what those extra bytes are, so that this fact can be verified.
This means that of suspecting MBS, we can either covict him beyond a shadow of a doubt, or completely exonerate him. If the encrypted file contains an exploit or malware, we can know for certain. Likewise, if it doesn't, we'll know that for certain as well.
The investigator Bezos hired used expensive tools marketed only to law enforcement. However, everything the did can be done by you at home with free tools. A section below describes how to do everything with your own iPhone using free tools to decrypt Whatsapp videos from your own iPhone.
However, such things can be easily decrypted. The term "end-to-end" means nobody in the middle can decrypt it, including the service provider like WhatsApp. However, those in posession of the "ends" can still decrypt it. The necessary decrypt key is, in fact, located right next to the encrypted filename within the WhatsApp database, so there's no reason why the investigators couldn't decrypt the file. All they would need is a tool -- a tool like this one.
This program doesn't simply decrypt the file, but also spits out a lot of diagnostic information about what it decoded in the file. One of the reasons the investigators were suspicious of the encrypted file was because it was slightly longer. In fact, WhatsApp encryption always adds between 11 and 26 bytes to the end of everything it encrypts, so this is not strange. This program decodes exactly what those extra bytes are, so that this fact can be verified.
This means that of suspecting MBS, we can either covict him beyond a shadow of a doubt, or completely exonerate him. If the encrypted file contains an exploit or malware, we can know for certain. Likewise, if it doesn't, we'll know that for certain as well.
The investigator Bezos hired used expensive tools marketed only to law enforcement. However, everything the did can be done by you at home with free tools. A section below describes how to do everything with your own iPhone using free tools to decrypt Whatsapp videos from your own iPhone.