GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Conversation

Notices

  1. Embed this notice
    Dave Rahardja (drahardja@sfba.social)'s status on Monday, 05-May-2025 13:03:02 JST Dave Rahardja Dave Rahardja

    User “mdh2” on Bluesky claims that Mike Waltz wasn’t caught using Signal on his phone, but something far worse: “TM SGNL”, an app made by an Israeli company called “CyberInt”. mdh2 claims that messages on that chat platform are backed up on 3rd party servers.

    This appears correct. The screenshot from Mike Waltz’s phone shows the “TM SGNL” product name.

    bsky post (login required): hxxps://bsky.app/profile/mdh2.bsky.social/post/3lo57bdld2c2q

    #kakistocracy #opsec

    In conversation about 9 days ago from sfba.social permalink

    Attachments


    1. https://files.sfba.social/media_attachments/files/114/441/736/538/985/593/original/816760d2576057e1.jpeg
    • Embed this notice
      Dave Rahardja (drahardja@sfba.social)'s status on Monday, 05-May-2025 13:03:01 JST Dave Rahardja Dave Rahardja
      in reply to

      Here’s TM SGNL maker’s website. Nowhere on its front page will you find the word “encrypted”. In fact, It appears that the company’s primary product is exporting the contents of WhatsApp, Signal, and Telegram apps on a phone so they can record otherwise E2E-encrypted messages. This product can be used to spy on employees’ private communications on their personal phones.

      The TM SGNL app is an “enterprise” (off the App Stores) app that captures messages from Signal and archives it. It is literally designed to circumvent Signal encryption and archive messages elsewhere.

      https://www.telemessage.com

      TM SGNL product page:

      https://www.telemessage.com/signal-archiver-transfer-from-ios-device/

      TM SGNL installation page:

      https://www.telemessage.com/signal-archiver-ios-installation-upgrade/

      In conversation about 9 days ago permalink

      Attachments

      1. No result found on File_thumbnail lookup.
        TeleMessage Corporate Home
      Rich Felker repeated this.
    • Embed this notice
      Dave Rahardja (drahardja@sfba.social)'s status on Monday, 05-May-2025 13:03:01 JST Dave Rahardja Dave Rahardja
      in reply to

      Update: TeleMessage’s message store has been exfiltrated. A hacker claimed it took them less than 30 minutes to access it. The archived messages were stored—apparently in plaintext?—in an AWS container, which they accessed.

      What’s more, the data contains usernames AND PASSWORDS. Did they really store plaintext passwords?

      Absolutely incredible. Mike Waltz and all the clowns that use this product for classified messaging need to be arrested and charged.

      #kakistocracy #MikeWaltz #opsec

      https://www.404media.co/the-signal-clone-the-trump-admin-uses-was-hacked/

      In conversation about 9 days ago permalink

Feeds

  • Activity Streams
  • RSS 2.0
  • Atom
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.