There's a "Signal deanonymized" thing going around:
https://gist.github.com/hackermondev/45a3cdfa52246f1d1201c1e8cdef6117
Stay calm. Deep breaths.
👉 while this is a real consideration, the only thing the attacker gets from this is a very rough (kilometers or tens of kilometers radius) location
👉 other communication platforms that use any kind of caching CDN to deliver attachments are just as affected
👉 you almost certainly should continue to use Signal, unless you specifically know that this is a big problem for you.
[#]Signal #InfoSec
=> More informations about this toot | More toots from rysiek@mstdn.social
In other words, it's not great that this is possible, but nowhere near an immediate and present danger to anyone except a very very small group of people doing very very specific things.
If you're in that group, you'd already known you are. You'd have someone to ask about this. And you'd almost certainly be using some other tools to anonymize yourself anyway.
If that's not the case, then this is almost certainly not something to lose sleep over. Signal remains a safe choice of a secure IM. 👍
=> More informations about this toot | More toots from rysiek@mstdn.social
If you're in that group, you'd already known you are.
Or, you know, you're tasked to presidential lifeguard duty, or Israeli specops, or French nuclear sub crew...
(those who know, know what that's a reference to)
@rysiek
=> More informations about this toot | More toots from osma@mas.to
@osma nah, those guys don't use Signal. They're all on Telegram and broadcasting their location (and layout of their military base) on Strava. :blobcatderpy:
=> More informations about this toot | More toots from rysiek@mstdn.social
text/gemini
This content has been proxied by September (ba2dc).