cancel
Showing results for 
Search instead for 
Did you mean: 

Sniffing Post Quantum TLS from Android device

P3xy0
Explorer
Explorer

Hey everyone,

 

I’m trying to capture Zoom’s post-quantum TLS traffic with Wireshark, but so far I haven’t had success.

 

Setup:

  • Windows computer hosting the meeting (E2EE enabled).

  • Another Windows device acting as an access point (via hotspot).

  • Pixel 8 running the latest Android version, connected to that access point.

  • Wireshark is capturing traffic on the access point’s interface.

 

What I tried:

  • Started a meeting on the Windows host.

  • Joined the same meeting with the Pixel 8 through the access point.

  • Captured all traffic and checked the TLS ClientHello/ServerHello messages.

Result:

  • All Zoom TLS traffic appears to be non-PQC.

  • However, the in-meeting green shield does show “Post-Quantum End-to-End Encryption.”

Additional info:

  • Both desktop and Android Zoom apps are up to date (Desktop version - 6.6.0, Android version - 6.5.12.33008).

  • Tried both when host and client are on the same access point and when they’re not.

 

Am I missing something in how PQC is negotiated, or is there another way I should capture traffic from the Android device to confirm PQC TLS?

 

Thanks in advance.

 

1 ACCEPTED SOLUTION

Ray_Harwood
Community Champion | Customer
Community Champion | Customer

This is a question more appropriate for the Developers Forum at https://devforum.zoom.us/


Ray -- check out the GoodClix website.

View solution in original post

1 REPLY 1

Ray_Harwood
Community Champion | Customer
Community Champion | Customer

This is a question more appropriate for the Developers Forum at https://devforum.zoom.us/


Ray -- check out the GoodClix website.