Skip to content
  • Hjem
  • Seneste
  • Etiketter
  • Populære
  • Verden
  • Bruger
  • Grupper
Temaer
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Kollaps
FARVEL BIG TECH
  1. Forside
  2. Ikke-kategoriseret
  3. New from 404 Media: the FBI was able to extract incoming Signal messages from a phone even though the app was deleted.

New from 404 Media: the FBI was able to extract incoming Signal messages from a phone even though the app was deleted.

Planlagt Fastgjort Låst Flyttet Ikke-kategoriseret
14 Indlæg 12 Posters 0 Visninger
  • Ældste til nyeste
  • Nyeste til ældste
  • Most Votes
Svar
  • Svar som emne
Login for at svare
Denne tråd er blevet slettet. Kun brugere med emne behandlings privilegier kan se den.
  • josephcox@infosec.exchangeJ josephcox@infosec.exchange

    New from 404 Media: the FBI was able to extract incoming Signal messages from a phone even though the app was deleted. Why? Because parts of messages were stored in the iPhone's internal notification database. Shows how secure chat data can come from unexpected places https://www.404media.co/fbi-extracts-suspects-deleted-signal-messages-saved-in-iphone-notification-database-2/

    misusecase@twit.socialM This user is from outside of this forum
    misusecase@twit.socialM This user is from outside of this forum
    misusecase@twit.social
    wrote sidst redigeret af
    #4

    @josephcox There has been some concern about security vulnerabilities and leaks associated with iOS notifications for a while, right?

    1 Reply Last reply
    0
    • josephcox@infosec.exchangeJ josephcox@infosec.exchange

      New from 404 Media: the FBI was able to extract incoming Signal messages from a phone even though the app was deleted. Why? Because parts of messages were stored in the iPhone's internal notification database. Shows how secure chat data can come from unexpected places https://www.404media.co/fbi-extracts-suspects-deleted-signal-messages-saved-in-iphone-notification-database-2/

      ujay68@mastodon.worldU This user is from outside of this forum
      ujay68@mastodon.worldU This user is from outside of this forum
      ujay68@mastodon.world
      wrote sidst redigeret af
      #5

      @josephcox Can we be more specific here? I can’t imagine technically that there’s a possibility of messages arriving *after* deleting the app being decrypted and stored in a device’s notification database? So this is probably about messages that arrived *before* deleting the app?

      netraven@hear-me.socialN 1 Reply Last reply
      0
      • arrakeen_urbanite@universeodon.comA arrakeen_urbanite@universeodon.com

        @josephcox The article strongly implies that if you change, in the app settings, Notifications | Show Preview, to “Never” that closes this for future messages anyway. To deal with past, I suppose wiping the phone OS and reinstalling (General | Reset iPhone?) should do the job, assuming the database is not backed up to iCloud.

        lasagne@chaos.socialL This user is from outside of this forum
        lasagne@chaos.socialL This user is from outside of this forum
        lasagne@chaos.social
        wrote sidst redigeret af
        #6

        @arrakeen_urbanite @josephcox

        If these fucking blogs would not just repost and instead provide advice...
        Like maybe testing how to clear that buffer.

        jdoe@freeradical.zoneJ 1 Reply Last reply
        0
        • ujay68@mastodon.worldU ujay68@mastodon.world

          @josephcox Can we be more specific here? I can’t imagine technically that there’s a possibility of messages arriving *after* deleting the app being decrypted and stored in a device’s notification database? So this is probably about messages that arrived *before* deleting the app?

          netraven@hear-me.socialN This user is from outside of this forum
          netraven@hear-me.socialN This user is from outside of this forum
          netraven@hear-me.social
          wrote sidst redigeret af
          #7

          @ujay68 @josephcox I just read the text and it seems pretty clear that it was saved in the notification databse. so....not the app. Does that help?

          ujay68@mastodon.worldU 1 Reply Last reply
          0
          • josephcox@infosec.exchangeJ josephcox@infosec.exchange

            New from 404 Media: the FBI was able to extract incoming Signal messages from a phone even though the app was deleted. Why? Because parts of messages were stored in the iPhone's internal notification database. Shows how secure chat data can come from unexpected places https://www.404media.co/fbi-extracts-suspects-deleted-signal-messages-saved-in-iphone-notification-database-2/

            pee@mastodon.onlineP This user is from outside of this forum
            pee@mastodon.onlineP This user is from outside of this forum
            pee@mastodon.online
            wrote sidst redigeret af
            #8

            @josephcox

            this is an old problem and as far as I remember, does not only affect iOS but all platforms incl. Android, Windows etc.

            Therefore it's a good idea to disable 'preview' in all notifications for all Apps on all platforms - as far as I recall, these are already mass-intercepted in transit.

            What's new to me is that iOS stores these, even after having deleted an App - begs the question, what about other platforms?

            1 Reply Last reply
            0
            • lasagne@chaos.socialL lasagne@chaos.social

              @arrakeen_urbanite @josephcox

              If these fucking blogs would not just repost and instead provide advice...
              Like maybe testing how to clear that buffer.

              jdoe@freeradical.zoneJ This user is from outside of this forum
              jdoe@freeradical.zoneJ This user is from outside of this forum
              jdoe@freeradical.zone
              wrote sidst redigeret af
              #9

              @lasagne @arrakeen_urbanite @josephcox Just yet another click baity headline from 404 media, nothing new.

              1 Reply Last reply
              0
              • josephcox@infosec.exchangeJ josephcox@infosec.exchange

                New from 404 Media: the FBI was able to extract incoming Signal messages from a phone even though the app was deleted. Why? Because parts of messages were stored in the iPhone's internal notification database. Shows how secure chat data can come from unexpected places https://www.404media.co/fbi-extracts-suspects-deleted-signal-messages-saved-in-iphone-notification-database-2/

                peteorrall@mastodon.bsd.cafeP This user is from outside of this forum
                peteorrall@mastodon.bsd.cafeP This user is from outside of this forum
                peteorrall@mastodon.bsd.cafe
                wrote sidst redigeret af
                #10

                @josephcox While obviously concerning, my first thought is if someone needs to securely communicate then perhaps a smartphone with an OS you can't fully control isn't the best tool.

                Signal may have great encryption but if the host OS has known vulnerabilities or design flaws that allow for this, then what's the point?

                I am certainly open to suggestions and discussion for better solutions.

                1 Reply Last reply
                0
                • josephcox@infosec.exchangeJ josephcox@infosec.exchange

                  New from 404 Media: the FBI was able to extract incoming Signal messages from a phone even though the app was deleted. Why? Because parts of messages were stored in the iPhone's internal notification database. Shows how secure chat data can come from unexpected places https://www.404media.co/fbi-extracts-suspects-deleted-signal-messages-saved-in-iphone-notification-database-2/

                  elly@donotsta.reE This user is from outside of this forum
                  elly@donotsta.reE This user is from outside of this forum
                  elly@donotsta.re
                  wrote sidst redigeret af
                  #11
                  @josephcox I thought it was obvious? Anyone who ever looked at iOS or Android logs knows that every single notification you ever received is stored in the logs, and are transferred to new devices if you use migration assistant or encrypted backup.

                  It's a valid and big attack vector, that's why I personally have notifications enabled to just tell me which app it is and why i'm getting a notification, no other context. Especially since push notifications are handled by Google/Apple's servers so if you can MITM it, you can collect a lot of sensitive data.
                  1 Reply Last reply
                  0
                  • netraven@hear-me.socialN netraven@hear-me.social

                    @ujay68 @josephcox I just read the text and it seems pretty clear that it was saved in the notification databse. so....not the app. Does that help?

                    ujay68@mastodon.worldU This user is from outside of this forum
                    ujay68@mastodon.worldU This user is from outside of this forum
                    ujay68@mastodon.world
                    wrote sidst redigeret af
                    #12

                    @Netraven I guess so. Wondering if iOS offers an API that Signal could (have) use(d) to completely clear its notifications from that db. I guess not so.

                    netraven@hear-me.socialN 1 Reply Last reply
                    0
                    • ujay68@mastodon.worldU ujay68@mastodon.world

                      @Netraven I guess so. Wondering if iOS offers an API that Signal could (have) use(d) to completely clear its notifications from that db. I guess not so.

                      netraven@hear-me.socialN This user is from outside of this forum
                      netraven@hear-me.socialN This user is from outside of this forum
                      netraven@hear-me.social
                      wrote sidst redigeret af
                      #13

                      @ujay68 I don't know, sorry.

                      1 Reply Last reply
                      0
                      • stevebellovin@infosec.exchangeS stevebellovin@infosec.exchange

                        @josephcox As I've long said, "you don't go through strong security, you go around it."

                        drwho@masto.hackers.townD This user is from outside of this forum
                        drwho@masto.hackers.townD This user is from outside of this forum
                        drwho@masto.hackers.town
                        wrote sidst redigeret af
                        #14

                        @SteveBellovin @josephcox Can I quote you on that?

                        1 Reply Last reply
                        0
                        • jwcph@helvede.netJ jwcph@helvede.net shared this topic
                        Svar
                        • Svar som emne
                        Login for at svare
                        • Ældste til nyeste
                        • Nyeste til ældste
                        • Most Votes


                        • Log ind

                        • Har du ikke en konto? Tilmeld

                        • Login or register to search.
                        Powered by NodeBB Contributors
                        Graciously hosted by data.coop
                        • First post
                          Last post
                        0
                        • Hjem
                        • Seneste
                        • Etiketter
                        • Populære
                        • Verden
                        • Bruger
                        • Grupper