John Jackson discovered a vulnerability in the desktop version of Signal messenger that could allow attackers to access incoming attachments. on this he knowledgeable On the John J Hacking portal.
PC versions of Signal 6.2.0 and previous versions for Windows, Linux, and macOS were noted to be affected by the CVE-2023-24068 and CVE-2023-24069 vulnerabilities that could allow potential attackers to access sensitive attachments sent in messages. and also replace.
It turns out that fraudsters can see attachments because they are stored in the device’s memory in an unencrypted form. It was noted that if the user deletes them from the conversation, the files are automatically deleted, but if the user replies to a message with a quote attachment, the document remains in the computer’s memory even after deleting it from the chat.
Also, as Jackson pointed out, an attacker could, if desired, modify the cached file that would be visible to other users after forwarding the attachment to another chat.
Currently, Signal 6.2.0 is the current version of the messenger.
Formerly socialbites.ca saidwhere hackers learned how to get players’ virtual dollars in GTA Online.
Source: Gazeta
Jackson Ruhl is a tech and sci-fi expert, who writes for “Social Bites”. He brings his readers the latest news and developments from the world of technology and science fiction.