Comment on How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes
0xD@infosec.pub 3 weeks agoThe passphrase or the unencrypted database are still open in memory. Though that is, of course, a more complicated attack but they could simply read it through the app itself.
HappyTimeHarry@lemm.ee 3 weeks ago
You can set it to wipe them from memory on different conditions, including instantly if youre that paranoid, sure its still possible. Its an optional feature most people wont use, but its pretty well thought out.
0xD@infosec.pub 3 weeks ago
Sounds great!