The US administration's use of Signal for discussing sensitive operations in the middle east was hacked! Officials were using an Israeli Signal clone called Telemessage. According to Micah Lee, this TM SGNL Signal clone app included vulnerabilities including hard coded credentials to communicate - taking only 15-20minutes for an attacker to compromise.
The compromise gave this hacker access to all of the contact information, and even the communications message contents in plaintext.
SignalGate Update: Not only were officials using Signal to discuss Yemen operations, it now gets worse. They were using a clone of the Signal client which archived all chat communications -
It's interesting to see the Signalgate update after recently covering the ghost method for archiving or adding 3rd party to end-to-end encrypted chats. This is where a 3rd party silently joins the chat - we share hypothetical risks depending upon implementation - Florida also has a new law threatening encryption. Age verification may affect our privacy / anonymity given both adults and underage would be required to identify themselves to verify age.
One of the concerns for encryption being compromised would be the hypothetical scenario of someone planting files in a conversation - this would present the most serious concern IMHO, given the potentially detrimental effect this could hold on fair trials.
We have to ask ourselves if we are willing to trade rights for the promise of increased security, and if those promises could even be kept to begin with.
Share the video to spread awareness on the risks of introducing encryption vulnerabilities.
Thanks for sharing
#Signalgate #telemessage #encryption
--------------------------------------------------------------
SUPPORT CHANNEL BY SHARING ON SOCIAL MEDIA:
Bringing you 100% independent content, aiming to introduce the most honest, unfiltered security & privacy content available. Eventually the algorithm must recognize it. Share to help this channel grow!
Thanks for sharing this and all videos. It's a HUGE help reposting these videos!
SUPPORT INDEPENDENT CONTENT BY SHARING / OPTIONS BELOW
SHARE YOUR THEORY / THOUGHTS IN COMMENTS
Join me today in this. Leave a comment, share a thought.
EMAIL: righttoprivacy[at]tutanota.com / righttoprivacy[at]i2pmail.org
(VIDEO SHARED EARLY ON PUBLIC BLOG: bmc.link/politictech)
Watch, And Share With Others!
I create independent content to keep you informed, share unique tips (many, completely original ideas, many, not found elsewhere), and cover stories to keep you informed on the most pressing personal security / privacy / open source topics.
If you learn something here, consider supporting below (sharing a video on social media is another great way to support this, motivating more time to new content)
💎 THANK YOU FOR CONSIDERING SUPPORTING THIS CHANNEL
💻 LAPTOP (coreboot / Intel ME neutered): bmc.link/politictech/commissions (options)
DONATIONS WELCOME (100% Independent Content):
MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNM
🪙 BITCOIN: bc1q44j0fjm2d4rp49l3wk6n6teshvztftl2qxuk44
CASHAPP - cash.app/$HumanRightsTech
MEMBERSHIP: bmc.link/politictech/membership (early / exclusive / more)
SUPPORT OPTIONS (LIST): bmc.link/politictech💻
*PUBLIC BLOG:* bmc.link/politictech/posts
First shared on public blog: buymeacoffee.com/politictech/posts (follow blog for free and / or optionally support this work)
📬 CHANNEL EMAIL CONTACT: righttoprivacy[at]tutanota.com
📬 CONTACT RTP (i2pmail): righttoprivacy[at]mail.i2p (I2P internal
コメント