Security Test Summary Customer: OKsystem s.r.o. Application: BABEL 3.4.0. Security Testing Conclusion and Summary Trustica s.r.o. performed security testing of application BABEL v 3.4.0 by OKsystem s.r.o. in November and December 2014. Namely the communication infrastructure, the mobile and server application architecture, and the functions securing the protection of user data against third party attacks underwent the testing. The application meets the current requirements for data security and uses ciphers, which are currently considered safe. Provided that The mobile application is running on a phone, in which an OS of the producer is running without adding backdoors or malware, The server application is operated by a trustworthy administrator, it is possible to declare the entire application as safe according to the producer’s description. In Prague, on 18 February 2015 Dominik Pantucek, CEO Information on the Tests Performed The tested subject was the BABEL application, designed for exchanging encrypted text messages between users of mobile phones running on the iOS and Android platforms. The application consists of the client side (a mobile phone binary application) and the server part, programmed in the J2EE environment. The protection subjects are messages exchanged between individual users. The messages are to be accessible exclusively by the owner of the mobile device in question, which is not compromised by any monitoring software. Security Test Summary Customer: OKsystem s.r.o. Application: BABEL 3.4.0. Mobile application attack scenarios: Unauthorised access with an unlocked OS environment Possibility of direct reading of messages in the OS Unauthorised access with a locked OS environment Connecting the device to a PC, copying the encrypted data Sniffing the data communication and breaching the ciphering methods Server application attack scenarios An attack by a user of the network, in which the server is located, with the goal of obtaining unauthorised access to the administration interface An attack by a user of the administration interface with regular user authorisation An attack by the authorised server administrator to the communication history stored in the user’s mobile device Generation of the session key: verification of the manner of generating the key designed for encrypting individual messages D-H exchange signature checking Checking the generation of a user’s private and public keys Checking the manner of ciphering of the Android storage, difficulty evaluation of an encryption breach and obtaining the data stored in the storage Verification of the server and mobile applications concerning the resistance to MITM attacks Testing the server part on a selected category of frequent vulnerabilities of web applications according to the OWASP methodology