

found that at least one implementation of the end-to-end encryption solution endorsed by ETSI has a similar issue that makes it equally vulnerable to eavesdropping. The encryption algorithm used for the device they examined starts with a 128-bit key, but this gets compressed to 56 bits before it encrypts traffic, making it easier to crack. It’s not clear who is using this implementation of the end-to-end encryption algorithm, nor if anyone using devices with the end-to-end encryption is aware of the security vulnerability in them.
STOP DOING THIS. Just like… Stop doing it. I thought this would be a MITM handshake thing but no. Use your brain. 128 bits of entropy minimum. 56 bits is a million CPU seconds at 1Billion gesses a second.
“Yet” as if it will ever