Set as Homepage - Add to Favorites

日韩欧美成人一区二区三区免费-日韩欧美成人免费中文字幕-日韩欧美成人免费观看-日韩欧美成人免-日韩欧美不卡一区-日韩欧美爱情中文字幕在线

【????? ???? ??????? ???????? ?? ??????】Signal says Cellebrite phone

Cellebrite was just put on ????? ???? ??????? ???????? ?? ??????notice.

The Israel-based company, which makes smartphone-hacking tools beloved by U.S. law enforcement and oppressive regimes around the world, failed to properly secure its own software — potentially compromising the integrity of all data gathered by its customers in the process.

That's according to a brutal blog post from Signal founder Moxie Marlinspike, published Wednesday on the official Signal blog, which alleges serious security flaws in Cellebrite's software.


You May Also Like

"[We] were surprised to find that very little care seems to have been given to Cellebrite's ownsoftware security," he writes. "Industry-standard exploit mitigation defenses are missing, and many opportunities for exploitation are present."

But wait, there's more. Much more.

Moxies writes that it is possible for a specially configured file — for example, say, in the Signal app — to surreptitiously alter all past and future data collected by Cellebrite tools. Such a file would essentially render the Cellebrite software worse than worthless, as it could actively corrupt any data already pulled from confiscated smartphones.

In other words, if such a file were included in an app on a smartphone, and that phone was connected to Cellebrite software, then all bets are off.

"If they add the file to Signal, that would be interesting... as yes it would mean that they could probably nuke/hack/infect Cellebrite," explained Patrick Wardle, the creator of Mac security website and tool suite Objective-See.

We reached out to Cellebrite, and asked if the company now considers phones loaded with Signal a risk.

"Cellebrite is committed to protecting the integrity of our customers' data, and we continually audit and update our software in order to equip our customers with the best digital intelligence solutions available," read the company's reply in part.

A video, included in the Signal blog post and incorporating scenes from the 1995 movie Hackers, shows one relatively harmless example of a potential exploit: a pop up on a Cellebrite device that reads, "MESS WITH THE BEST, DIE LIKE THE REST. HACK THE PLANET!"

Mashable Light Speed Want more out-of-this world tech, space and science stories? Sign up for Mashable's weekly Light Speed newsletter. By clicking Sign Me Up, you confirm you are 16+ and agree to our Terms of Use and Privacy Policy. Thanks for signing up!
Mashable ImageHack the planet. Credit: signal

Of course, if this were anything other than a demo, there likely wouldn't be a notification. And the outcome might be more serious than a line from Hackers.

"Any app could contain such a file," writes Moxie, "and until Cellebrite is able to accurately repair all vulnerabilities in its software with extremely high confidence, the only remedy a Cellebrite user has is to not scan devices."

Dan Tentler, the executive founder of the security company Phobos Group, explained over email that Moxie's findings mean that it's now incredibly risky for government agents to use Cellebrite's products.

"What agency would you like to exploit?" he asked rhetorically. "Bait one of them into reading a phone loaded with the exploit, and have the exploit then compromise the computer the Cellebrite platform is plugged into after the fact to retrieve the files."

"What agency would you like to exploit?"

Notably, especially for Cellebrite and its customers, Moxie hints that future versions of Signal might incorporate the type of file he describes.

"In completely unrelated news, upcoming versions of Signal will be periodically fetching files to place in app storage," he writes. "These files are never used for anything inside Signal and never interact with Signal software or data, but they look nice, and aesthetics are important in software."

But will Signal actually do it?

"I think it's more likely the [Signal] article [is meant to] bring awareness to the issue, and I would be surprised if the exploit / file is included," wrote Wardle.

Tentler, for his part, sees Cellebrite's alleged failure to get its security house in order as a part of a larger trend.

SEE ALSO: You can buy used Cellebrite iPhone hacking tools for cheap on eBay

"Cellebrite is just another vendor in the security space who makes a 'security product' but 'does no security themselves,'" he wrote. "There will be many more of these to come — giving people a false sense of security pays big money, and a gigantic majority of the 'information security industry' falls into this category."

Hack the planet, indeed.

UPDATE: April 21, 2021, 1:59 p.m. PDT: This story was updated to include comment from Patrick Wardle, the creator of Mac security website and tool suite Objective-See.

UPDATE: April 21, 2021, 3:39 p.m. PDT: This story was updated to include Cellebrite's comment.

Topics Cybersecurity Privacy

0.1217s , 9926.71875 kb

Copyright © 2025 Powered by 【????? ???? ??????? ???????? ?? ??????】Signal says Cellebrite phone,Public Opinion Flash  

Sitemap

Top 主站蜘蛛池模板: 国产69精品久久久久观看软件 | 国产片av国语在线观麻豆 | 亚洲国产网站 | 国产精品精品推荐第一页 | 狠狠色噜噜狠狠色综合久 | 国产三级片精品视频 | 成a人亚洲精v品无码 | 欧美日韩中文国产一区二区三区 | 国产伦子系列沙发午睡 | 国产丝袜美腿高跟白浆 | 欧美日韩国产成人高清视频 | 久久热这里有精品 | 欧美精品九九99久久在免费线 | 成人在线黄色 | 成人无码一区二区免费 | 亚洲国产精品久久又爽黄A片 | 制服丝袜中文字幕有码中出 | 日本成人二区 | 成人亚洲A片V一区二区三区蜜月 | 国产日韩久久 | 亚洲加勒比无码一区二区 | 亚 久在线观看影音先锋黄色视频 | v一本久道久久波多野结 | 婷婷激情四射网 | 2024国产丝袜在线观看 | 日韩中文无码有码免费视频 | 久久国产精品久久精品 | 橙人精品在线观看 | 国产av人人夜夜澡人人爽麻豆 | 亚洲av片天天在线观看 | 99热国产这里只有精品6 | 国产三级不卡在线播放 | 欧美熟色妇 | 欧日韩美香蕉在线观看 | 在线视频亚太国产欧美一区二区 | 欧美日韩国产一区二 | 2024国产最新视频在线观看 | 久久久久久久国产视频 | 黄色视频在线播放免费不卡 | 国产三级av在线播放 | 国产高清无码在线观看 |