GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Conversation

Notices

  1. Embed this notice
    Kevin Beaumont (gossithedog@cyberplace.social)'s status on Monday, 05-May-2025 08:33:33 JST Kevin Beaumont Kevin Beaumont

    The third party version of Signal the White House has been using has been hacked, and Signal messages from devices stolen (as they were being sent to the supplier)

    https://www.404media.co/the-signal-clone-the-trump-admin-uses-was-hacked/

    In conversation about a month ago from cyberplace.social permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: www.404media.co
      The Signal Clone the Trump Admin Uses Was Hacked
      from @josephfcox
      TeleMessage, a company that makes a modified version of Signal that archives messages for government agencies, was hacked.
    • Steve's Place and Rich Felker repeated this.
    • Embed this notice
      EndicottRoad59 (endicottauthor@mastodon.social)'s status on Monday, 05-May-2025 13:59:33 JST EndicottRoad59 EndicottRoad59
      in reply to

      @GossiTheDog How about we just gut the White House and start over?

      In conversation about a month ago permalink
    • Embed this notice
      Steve's Place (steter@mastodon.stevesworld.co)'s status on Monday, 05-May-2025 14:00:22 JST Steve's Place Steve's Place
      in reply to

      @GossiTheDog This is treason in plain sight.

      In conversation about a month ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Monday, 05-May-2025 21:23:28 JST Kevin Beaumont Kevin Beaumont
      in reply to

      The SignalNotSignal hack of US government is really big. Some examples for those who haven’t seen it. The USG managed to take an encrypted platform, backdoor it, and got owned.

      In conversation about a month ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/114/455/202/237/947/143/original/52ac669d4ca17b82.jpeg

      2. https://cyberplace.social/system/media_attachments/files/114/455/202/488/201/917/original/5f18f46f66b82595.jpeg
      Rich Felker and GreenSkyOverMe (Monika) repeated this.
    • Embed this notice
      8tpercent (8tpercent@fosstodon.org)'s status on Monday, 05-May-2025 21:48:19 JST 8tpercent 8tpercent
      in reply to

      @GossiTheDog
      Other customers... https://web.archive.org/web/20250310170118/https://www.telemessage.com/customers/

      In conversation about a month ago permalink

      Attachments

      1. Domain not in remote thumbnail source whitelist: web.archive.org
        Customers
        Here’s just a brief glimpse of many enterprise customers we have worked with over the years.
    • Embed this notice
      JP (jplonie@aus.social)'s status on Monday, 05-May-2025 21:57:12 JST JP JP
      in reply to

      @GossiTheDog more like an Mosad intel collection op just got burnt.

      In conversation about a month ago permalink
    • Embed this notice
      Rich Felker (dalias@hachyderm.io)'s status on Monday, 05-May-2025 21:57:59 JST Rich Felker Rich Felker
      in reply to
      • JP

      @Jplonie @GossiTheDog This. You'd have to be incompetent af to use any security/comms product from an Israeli company.

      In conversation about a month ago permalink
    • Embed this notice
      Kool Depeche Moe Dee (eviljarred@infosec.exchange)'s status on Monday, 05-May-2025 21:58:48 JST Kool Depeche Moe Dee Kool Depeche Moe Dee
      in reply to

      @GossiTheDog I think there is a different lens to view this through. They didn't write the software for this Signal "clone."

      What they did was ignore USG requirements for obtaining and provisioning vetted software, and bypassed the normal channels via shadow IT to use software from some sketchy Israeli intelligence-linked hacks.

      And this illustrates why the red tape and bureaucracy that Trump and DOGE and all of those cronies bemoan exists. It exists based on prior assessments of risk and the appropriate controls needed to manage that risk, which the current administration wholly ignores.

      Where this has happened, you can guarantee there are even greater, more consequential risks being taken in the name of "efficiency" and "cutting through red tape."

      Fucking amateurs.

      In conversation about a month ago permalink
    • Embed this notice
      RootWyrm 🇺🇦:progress: (rootwyrm@weird.autos)'s status on Monday, 05-May-2025 21:59:09 JST RootWyrm 🇺🇦:progress: RootWyrm 🇺🇦:progress:
      in reply to

      @GossiTheDog and people are still sleeping on the fact that this is not some 'small fry' company. "TM_SGNL" can reasonably be assumed to reflect the practices of OTHER products at parent company Smarsh. Which is actually a fairly large player in the compliance archiving space.

      Which tells me that there's a non-zero chance their other products (which are all SaaS) have similar 'security' practices.

      Just what you want from a company selling you 'Conduct Surveillance.'

      In conversation about a month ago permalink
      Rich Felker repeated this.
    • Embed this notice
      RootWyrm 🇺🇦:progress: (rootwyrm@weird.autos)'s status on Monday, 05-May-2025 21:59:23 JST RootWyrm 🇺🇦:progress: RootWyrm 🇺🇦:progress:
      in reply to

      @GossiTheDog and boy howdy are those products full of red flags.

      For example:
      https://www.smarsh.com/platform/enterprise/conduct

      "Supervise[s] more than 100 communication channels (including audio and video)"

      So it's not so much 'archiving' as 'spyware' where everything is being dumped into S3 buckets by people with ... *questionable* security practices.

      In conversation about a month ago permalink

      Attachments

      1. Domain not in remote thumbnail source whitelist: www.smarsh.com
        Communications Surveillance | Smarsh Enterprise Conduct
        Smarsh Enterprise Conduct is an AI-powered communications surveillance and supervision solution that helps firms mitigate risks.
    • Embed this notice
      VessOnSecurity (bontchev@infosec.exchange)'s status on Monday, 05-May-2025 22:20:44 JST VessOnSecurity VessOnSecurity
      in reply to

      @GossiTheDog
      In case you missed it in the actual article:

      "The hacker was able to access data that the app captured intermittently for debugging purposes, and would not have been able to capture every single message or piece of data that passes through TeleMessage’s service."

      That is, this was only debug data, not actual logged messages. As far as I understand, the actual logs are encrypted with a password - although that probably doesn't amount to much, since the password seems to be hard-coded in the app.

      Also, you have to pick one:

      - Trump's government is bad because they use Signal's disappearing messages to avoid scrutiny

      or

      - Trump's government is bad because they complied with a judge's order to log Signal messages.

      You can't criticize them for both simultaneously and still have any credibility that your reasoning isn't obscured by your politics.

      Oh, and Telemessage was procured by the Biden administration - it is not a Trump thing. They just used it to comply with the judge's order.

      In conversation about a month ago permalink
    • Embed this notice
      dave (hologram@cyberplace.social)'s status on Monday, 05-May-2025 22:41:27 JST dave dave
      in reply to

      @GossiTheDog I caught a few scoops early this am, but I missed this one! thanks for the tip

      In conversation about a month ago permalink
    • Embed this notice
      dave (hologram@cyberplace.social)'s status on Monday, 05-May-2025 22:57:05 JST dave dave
      in reply to

      @GossiTheDog looking at 404media, anyone who can donate will get improved access, and it sounds like a good idea 👍

      In conversation about a month ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Tuesday, 06-May-2025 06:48:35 JST Kevin Beaumont Kevin Beaumont
      in reply to

      The SignalNotSignal service used by the USG has been hacked for a second time today by a different threat actor, and has been taken offline. https://www.nbcnews.com/tech/security/telemessage-suspends-services-hackers-say-breached-app-rcna204925

      In conversation about a month ago permalink

      Attachments

      1. Domain not in remote thumbnail source whitelist: media-cldnry.s-nbcnews.com
        Messaging app seen in use by Mike Waltz suspends services after hackers claim breach
        from NBCNews
        Mike Waltz seemed to use the app at last week's Cabinet meeting, according to a photograph published by Reuters.
    • Embed this notice
      Antony (diagprov@mathstodon.xyz)'s status on Tuesday, 06-May-2025 06:55:06 JST Antony Antony
      in reply to

      @GossiTheDog think how much good they're doing for encrypted messengers though.

      First, family asked me about signal and considered trying it after I showed them it functions just like WhatsApp.
      Now they just made a great case for how badly wrong mandated backdoors can go.

      In conversation about a month ago permalink
    • Embed this notice
      Justin Fitzsimmons (smn@l3ib.org)'s status on Tuesday, 06-May-2025 08:16:22 JST Justin Fitzsimmons Justin Fitzsimmons
      in reply to
      • Rich Felker
      • JP

      @dalias @Jplonie @GossiTheDog especially one that is outwardly advertising its connections to the IDF 🤦♂️

      > I haven't spent a lot of time looking into TeleMessage, but what I did find at a quick glance is that several of the executives on the teams page list Israeli universities in their bios, and the CEO, Guy Levit, says that, "From 1996 until 1999, Guy served as the head of the planning and development of one of the IDF’s Intelligence elite technical units."

      https://infosec.exchange/@micahflee/114440391172505310

      In conversation about a month ago permalink

      Attachments

      1. No result found on File_thumbnail lookup.
        Micah Lee (@micahflee@infosec.exchange)
        from Micah Lee
        I wrote up a detailed analysis of TM SGNL, the unofficial Signal app that senior Trump fascists use to organize their war crimes https://micahflee.com/tm-sgnl-the-obscure-unofficial-signal-app-mike-waltz-uses-to-text-with-trump-officials/

Feeds

  • Activity Streams
  • RSS 2.0
  • Atom
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.