May 11, 2021

Signal Blog: Exploiting vulnerabilities in Cellebrite UFED and Physical Analyzer from an app’s perspective

UurTUYSwEPBt6qrfTRtYDTYkIGAsXU44qdxOZx0lgrI.jpg

Home Forums Signal Blog: Exploiting vulnerabilities in Cellebrite UFED and Physical Analyzer from an app’s perspective

This topic contains 1 reply, has 2 voices, and was last updated by  iBoMbY 2 weeks, 5 days ago.

  • Author
    Posts
  • #385873

    anonymous
    Participant


    Signal Blog: Exploiting vulnerabilities in Cellebrite UFED and Physical Analyzer from an app’s perspective

  • #385875

    iBoMbY

    In short: The software widely used by authorities, including many authoritarian regimes, to make copies from phones has countless security vulnerabilities, which can be exploited by simply putting specially prepared files on the phone, to gain full control over the scanning system.

  • #385876

    likwidtek

    It baffles me how people aren’t making a bigger deal about this blog post. This is comedy GOLD. One of the best security blog posts I’ve read in forever. Dying laughing here.

  • #385877

    djkhaled108

    What is better to use then? My company which has a very significant cyber protection team recommends Signal as the best software of this type.

    Is wickr better maybe?

You must be logged in to reply to this topic.