Now, obviously a "perfectly safe platform" is one you'd feel totally comfortable writing your private keys into πŸ˜„ β€”Β and that doesn't exist, and Signal for sure has never been one of them.
Still, I'd be interested to know what "breaking into my Signal account" means in this context.
Thoughts?
(Disclaimer: Personal opinions about Tucker aren't relevant, I'm interested in the hack)
I think it's more likely they broke into his phone with spyware similar to pegasus; probably a lot easier too.
They no longer need to hack a service, only the user's device.
Same thing used several times with journalists and such.
Newer versions are zero click, they only need a device identifier like a phone number for example and they're in!
This totally won't be misused by anyone πŸ™ƒ
reply
Is there any way to defend against it and still have a telephone number on your phone?
reply
This is exactly what came to my mind when I thought about this. If his phone were compromised they would just see everything he types without needing to access Signal β€” and Tucker would just assume "they got into my account."
reply
Can you share any pointers explaining this attack?
reply
Pegasus is a particularly nasty little bastard β€”Β ostensibly only deployed by governments hunting down the bad guys (😜), but known to have also been deployed by such fun actors as Mexican cartels.
It infects a phone and basically leaves it wide open to anything. You can read the details here: https://www.comparitech.com/blog/information-security/what-is-pegasus-malware/
They've found it on hardware belonging to politicians, military guys, CEOs, anyone with access to important things.
The company that made Pegasus shut down recently, but there are other comparable malwares running around. I'm going to guess something like this (not exactly this) is behind Tucker's wrecking.
reply
Thanks for the link.
Pegasus sounds like magic. I believe it, but it's crazy that there are zero-click ways to jailbreak phones remotely, given how many people work hard to make it impossible.
If anyone finds useful technical info on how it works, which vulnerabilities it uses, please share.
reply
deleted by author
reply
reply
deleted by author
reply
Satoshi smiles)almost anyone can hack their way in. it's not difficult) The new SHA256 is coming soon . will be a major change for bitcoin. As strange as it may sound.
reply