How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes
-
schrieb am 18. Mai 2025, 19:05 zuletzt editiert vonThis post did not contain any content.
How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes
The company behind the Signal clone used by at least one Trump administration official was breached earlier this month. The hacker says they got in thanks to a basic misconfiguration.
WIRED (www.wired.com)
-
This post did not contain any content.
How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes
The company behind the Signal clone used by at least one Trump administration official was breached earlier this month. The hacker says they got in thanks to a basic misconfiguration.
WIRED (www.wired.com)
schrieb am 18. Mai 2025, 19:35 zuletzt editiert vonHere's a link to the original article (from the same author) on the platform you should actually subscribe to.
The Signal Clone the Trump Admin Uses Was Hacked
TeleMessage, a company that makes a modified version of Signal that archives messages for government agencies, was hacked.
404 Media (www.404media.co)
-
This post did not contain any content.
How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes
The company behind the Signal clone used by at least one Trump administration official was breached earlier this month. The hacker says they got in thanks to a basic misconfiguration.
WIRED (www.wired.com)
schrieb am 18. Mai 2025, 20:04 zuletzt editiert vonworks in almost exactly the same way as Signal, except that it also archives copies of all the messages passing through it, shattering all of its security guarantees.
Pretty sure Signal does that as well, which is not a security issue.
-
works in almost exactly the same way as Signal, except that it also archives copies of all the messages passing through it, shattering all of its security guarantees.
Pretty sure Signal does that as well, which is not a security issue.
schrieb am 18. Mai 2025, 20:07 zuletzt editiert vonSignal uses end-to-end encryption (E2EE). The only copies of messages are on the sender’s and recipient’s devices.
-
Signal uses end-to-end encryption (E2EE). The only copies of messages are on the sender’s and recipient’s devices.
schrieb am 18. Mai 2025, 20:15 zuletzt editiert vonCopies of messages are also known as archives.
-
Copies of messages are also known as archives.
schrieb am 18. Mai 2025, 20:25 zuletzt editiert vonSignal does not archive messages on server side
-
Signal does not archive messages on server side
schrieb am 18. Mai 2025, 20:27 zuletzt editiert vonThey weren't talking about the server:
This app...works in almost exactly the same way as Signal, except that it also archives copies of all the messages passing through it, shattering all of its security guarantees.
-
They weren't talking about the server:
This app...works in almost exactly the same way as Signal, except that it also archives copies of all the messages passing through it, shattering all of its security guarantees.
schrieb am 18. Mai 2025, 20:40 zuletzt editiert vonIt's why Molly has local database encryption.
-
They weren't talking about the server:
This app...works in almost exactly the same way as Signal, except that it also archives copies of all the messages passing through it, shattering all of its security guarantees.
schrieb am 18. Mai 2025, 21:12 zuletzt editiert vonLater in the article, it talks specifically about the server-side archives being stored in plain text. That’s why the hacker was able to access messages. This isn’t about the local copies on phones.
-
It's why Molly has local database encryption.
schrieb am 18. Mai 2025, 21:22 zuletzt editiert vonThat doesn't really do anything. Attackers need local access to the device to get the database itself. Chances are, they'll get the key right with it.
-
That doesn't really do anything. Attackers need local access to the device to get the database itself. Chances are, they'll get the key right with it.
schrieb am 18. Mai 2025, 21:26 zuletzt editiert vonMolly encrypts it using a passphrase instead of a locally stored key for exactly that reason.
-
Later in the article, it talks specifically about the server-side archives being stored in plain text. That’s why the hacker was able to access messages. This isn’t about the local copies on phones.
schrieb am 18. Mai 2025, 22:19 zuletzt editiert vonYeah I didn't read past the misinformation
-
Yeah I didn't read past the misinformation
schrieb am 19. Mai 2025, 00:32 zuletzt editiert vonKinda seems like you're the misinformation.
-
Yeah I didn't read past the misinformation
schrieb am 19. Mai 2025, 00:57 zuletzt editiert vonMaybe you should start reading up on stuff you don't know about before adding nonsense to internet threads.
-
Kinda seems like you're the misinformation.
schrieb am 19. Mai 2025, 01:18 zuletzt editiert von ulrich@feddit.orgYou're confused, I am not the author of this article. I did not write the statement above, just copied and pasted it here.
-
Maybe you should start reading up on stuff you don't know about before adding nonsense to internet threads.
schrieb am 19. Mai 2025, 01:18 zuletzt editiert von ulrich@feddit.orgDon't know what you mean. I didn't add any "nonsense". Just a direct quote from the article in question.
-
This post did not contain any content.
How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes
The company behind the Signal clone used by at least one Trump administration official was breached earlier this month. The hacker says they got in thanks to a basic misconfiguration.
WIRED (www.wired.com)
schrieb am 19. Mai 2025, 02:12 zuletzt editiert von -
You're confused, I am not the author of this article. I did not write the statement above, just copied and pasted it here.
schrieb am 19. Mai 2025, 02:32 zuletzt editiert vonI'm not confused, you're intentionally misreading what's happening for some reason.
"Passing through it" pretty clearly refers to the server as that's what was hacked into and had plain text archives.
You're hyper fixating on the fact that the article says "the app" when referring to both the phone and server pieces to try and argue... something.
-
I'm not confused, you're intentionally misreading what's happening for some reason.
"Passing through it" pretty clearly refers to the server as that's what was hacked into and had plain text archives.
You're hyper fixating on the fact that the article says "the app" when referring to both the phone and server pieces to try and argue... something.
schrieb am 19. Mai 2025, 02:47 zuletzt editiert vonYou are confused. I'm not "intentionally misreading" anything, it was written incorrectly. I'm not trying to argue anything. I'm just reading the (wrong) words used in the article. When I come across a piece of misinformation, I don't continue reading in the hopes that they clear it up later, I write it off and close it.
Someone else cleared this up. There's no reason to continue arguing about it.
-
You are confused. I'm not "intentionally misreading" anything, it was written incorrectly. I'm not trying to argue anything. I'm just reading the (wrong) words used in the article. When I come across a piece of misinformation, I don't continue reading in the hopes that they clear it up later, I write it off and close it.
Someone else cleared this up. There's no reason to continue arguing about it.
schrieb am 19. Mai 2025, 02:59 zuletzt editiert von abidanyre@lemmy.world 6. Jan. 2025, 22:59I'm still not confused and you're still missing the forest for the trees because you don't like the common practice of including the server infrastructure when talking about apps.
There was a plaintext archive of messages on a remote server. That's a security problem no matter what point you're trying to make about the term app.
-
-
-
1
-
Bruce Lee, Jackie Chan and ‘A Better Tomorrow’: AI-Powered Kung Fu Film Plan Debuts in Shanghai
Technology 19. Juni 2025, 20:211
-
-
-
-
A UK government trial with 20K+ civil servants using Microsoft's Copilot AI for three months found a 26 minute average daily time saving, or two weeks per year
Technology 2. Juni 2025, 13:591