Here’s a link to the original article (from the same author) on the platform you should actually subscribe to.
How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes
Submitted 9 hours ago by jeffw@lemmy.world to technology@lemmy.world
https://www.wired.com/story/how-the-signal-knock-off-app-telemessage-got-hacked-in-20-minutes/
Comments
Botzo@lemmy.world 9 hours ago
treadful@lemmy.zip 8 hours ago
The Wired article is not based on the 404 article. This one goes into detail about the mechanics of the hack.
OsrsNeedsF2P@lemmy.ml 8 hours ago
Non-paywall: archive.is/qwonI
NotSteve_@lemmy.ca 2 hours ago
Ulrich@feddit.org 8 hours ago
works in almost exactly the same way as Signal, except that it also archives copies of all the messages passing through it, shattering all of its security guarantees.
Pretty sure Signal does that as well, which is not a security issue.
disguy_ovahea@lemmy.world 8 hours ago
Signal uses end-to-end encryption (E2EE). The only copies of messages are on the sender’s and recipient’s devices.
Ulrich@feddit.org 8 hours ago
Copies of messages are also known as archives.
tfm@europe.pub 8 hours ago
Good that the most powerful people in the world use it then
floofloof@lemmy.ca 39 minutes ago
They sound staggeringly incompetent. And anyone who bought their software without any investigation into its quality also sounds staggeringly incompetent.