Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

agnos.is Forums

  1. Home
  2. World News
  3. Kremlin targeting app at heart of White House group chat leaks

Kremlin targeting app at heart of White House group chat leaks

Scheduled Pinned Locked Moved World News
world
29 Posts 25 Posters 237 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • Z This user is from outside of this forum
    Z This user is from outside of this forum
    [email protected]
    wrote on last edited by
    #1
    This post did not contain any content.
    A ? paragone@lemmy.worldP S Z 9 Replies Last reply
    1
    0
    • System shared this topic on
    • Z [email protected]
      This post did not contain any content.
      A This user is from outside of this forum
      A This user is from outside of this forum
      [email protected]
      wrote on last edited by
      #2

      Yes that todays big storyline

      sensiblepuffin@lemmy.funami.techS 1 Reply Last reply
      0
      • Z [email protected]
        This post did not contain any content.
        ? Offline
        ? Offline
        Guest
        wrote on last edited by
        #3

        Even if they do get access to the chat logs, good luck brute forcing those encryption keys Putin!

        J ? R 3 Replies Last reply
        0
        • Z [email protected]
          This post did not contain any content.
          paragone@lemmy.worldP This user is from outside of this forum
          paragone@lemmy.worldP This user is from outside of this forum
          [email protected]
          wrote on last edited by
          #4

          https://duckduckgo.com/?q=kremlin+targetting+signal+accounts&t=fpas&ia=web

          it seems there's some real mechanism, involved in this..

          1 Reply Last reply
          0
          • Z [email protected]
            This post did not contain any content.
            S This user is from outside of this forum
            S This user is from outside of this forum
            [email protected]
            wrote on last edited by
            #5

            Uh, no shit. State backed espionage groups are targeting the communications channels used by their primary targets. What are you going to tell me next? That water is wet and fire is hot? If the US government started using IP over Avian Carrier ((EFC1149)[https://datatracker.ietf.org/doc/html/rfc1149]) you can bet that the GRU would start up a program to intercept the carriers.

            ? darkassassin07@lemmy.caD 2 Replies Last reply
            0
            • Z [email protected]
              This post did not contain any content.
              Z This user is from outside of this forum
              Z This user is from outside of this forum
              [email protected]
              wrote on last edited by
              #6

              Witkoff in Moscow when added to chat?

              https://bsky.app/profile/olgalautman.bsky.social/post/3ll663snbc224

              1 Reply Last reply
              0
              • S [email protected]

                Uh, no shit. State backed espionage groups are targeting the communications channels used by their primary targets. What are you going to tell me next? That water is wet and fire is hot? If the US government started using IP over Avian Carrier ((EFC1149)[https://datatracker.ietf.org/doc/html/rfc1149]) you can bet that the GRU would start up a program to intercept the carriers.

                ? Offline
                ? Offline
                Guest
                wrote on last edited by
                #7

                IPoAC. The ping is pretty slow, but the bandwidth is incredible

                darkassassin07@lemmy.caD 1 Reply Last reply
                0
                • S [email protected]

                  Uh, no shit. State backed espionage groups are targeting the communications channels used by their primary targets. What are you going to tell me next? That water is wet and fire is hot? If the US government started using IP over Avian Carrier ((EFC1149)[https://datatracker.ietf.org/doc/html/rfc1149]) you can bet that the GRU would start up a program to intercept the carriers.

                  darkassassin07@lemmy.caD This user is from outside of this forum
                  darkassassin07@lemmy.caD This user is from outside of this forum
                  [email protected]
                  wrote on last edited by
                  #8

                  It's not a surprise Russia and friends are attacking the platform; it's surprising the Whitehouse is using it for official communications. (or at least it would be, if the WH wasn't occupied by nazi tech bros...)

                  S L 2 Replies Last reply
                  0
                  • ? Guest

                    IPoAC. The ping is pretty slow, but the bandwidth is incredible

                    darkassassin07@lemmy.caD This user is from outside of this forum
                    darkassassin07@lemmy.caD This user is from outside of this forum
                    [email protected]
                    wrote on last edited by
                    #9

                    🤔 I wonder how much data a single bird could feasibly carry. Quite a bit more than when this standard was first thought up I'm sure. You can get some incredibly high capacity sd cards now.

                    E A L P 4 Replies Last reply
                    0
                    • Z [email protected]
                      This post did not contain any content.
                      D This user is from outside of this forum
                      D This user is from outside of this forum
                      [email protected]
                      wrote on last edited by
                      #10

                      It’s ok. The US government decided Russia isn’t a cyberthreat anymore.

                      https://www.theguardian.com/us-news/2025/feb/28/trump-russia-hacking-cyber-security

                      J 1 Reply Last reply
                      0
                      • Z [email protected]
                        This post did not contain any content.
                        R This user is from outside of this forum
                        R This user is from outside of this forum
                        [email protected]
                        wrote on last edited by
                        #11

                        To be honest, I'm surprised they didn't use telegram.

                        1 Reply Last reply
                        0
                        • D [email protected]

                          It’s ok. The US government decided Russia isn’t a cyberthreat anymore.

                          https://www.theguardian.com/us-news/2025/feb/28/trump-russia-hacking-cyber-security

                          J This user is from outside of this forum
                          J This user is from outside of this forum
                          [email protected]
                          wrote on last edited by
                          #12

                          It could also be someone sitting on their bed that weighs 400 pounds

                          1 Reply Last reply
                          0
                          • darkassassin07@lemmy.caD [email protected]

                            🤔 I wonder how much data a single bird could feasibly carry. Quite a bit more than when this standard was first thought up I'm sure. You can get some incredibly high capacity sd cards now.

                            E This user is from outside of this forum
                            E This user is from outside of this forum
                            [email protected]
                            wrote on last edited by
                            #13

                            Pretty much every time there have been head to head competitions between birds and wires, the birds have won.

                            A L 2 Replies Last reply
                            0
                            • darkassassin07@lemmy.caD [email protected]

                              🤔 I wonder how much data a single bird could feasibly carry. Quite a bit more than when this standard was first thought up I'm sure. You can get some incredibly high capacity sd cards now.

                              A This user is from outside of this forum
                              A This user is from outside of this forum
                              [email protected]
                              wrote on last edited by
                              #14

                              African or European swallow?

                              1 Reply Last reply
                              0
                              • ? Guest

                                Even if they do get access to the chat logs, good luck brute forcing those encryption keys Putin!

                                J This user is from outside of this forum
                                J This user is from outside of this forum
                                [email protected]
                                wrote on last edited by
                                #15

                                Wasn’t there a hacker group some years ago that released Signal binaries with backdoors that allowed attackers to read decrypted messages?

                                1 Reply Last reply
                                0
                                • darkassassin07@lemmy.caD [email protected]

                                  It's not a surprise Russia and friends are attacking the platform; it's surprising the Whitehouse is using it for official communications. (or at least it would be, if the WH wasn't occupied by nazi tech bros...)

                                  S This user is from outside of this forum
                                  S This user is from outside of this forum
                                  [email protected]
                                  wrote on last edited by
                                  #16

                                  It's a pretty good endorsement of the app!

                                  A 1 Reply Last reply
                                  0
                                  • ? Guest

                                    Even if they do get access to the chat logs, good luck brute forcing those encryption keys Putin!

                                    ? Offline
                                    ? Offline
                                    Guest
                                    wrote on last edited by
                                    #17

                                    Well, he just needs to get them to accidentally add his spy to their group chat. How hard can it be?

                                    1 Reply Last reply
                                    0
                                    • darkassassin07@lemmy.caD [email protected]

                                      It's not a surprise Russia and friends are attacking the platform; it's surprising the Whitehouse is using it for official communications. (or at least it would be, if the WH wasn't occupied by nazi tech bros...)

                                      L This user is from outside of this forum
                                      L This user is from outside of this forum
                                      [email protected]
                                      wrote on last edited by
                                      #18

                                      Additionally, they're likely using it on their personal, insecure phones, on insecure networks.

                                      There's whole layers of security being bypassed here.

                                      1 Reply Last reply
                                      0
                                      • ? Guest

                                        Even if they do get access to the chat logs, good luck brute forcing those encryption keys Putin!

                                        R This user is from outside of this forum
                                        R This user is from outside of this forum
                                        [email protected]
                                        wrote on last edited by
                                        #19

                                        I can think of easier ways of compromising the data besides brute forcing the keys, off the top of my head, and I'm just some schmuck.

                                        1. Compromise their endpoint with a malicious app on the app store.

                                        2. Gain physical access to the device and compromise it. Use your imagination – pickpocket, traffic stop or customs inspection by a compromised agent, seduce them with a honeypot, etc.

                                        3. Socially engineer them to mistakingly add you to their group chats.

                                        4. SIM swap

                                        Signal might be fine for journalists, criminals, cheating spouses, and general privacy when used properly with good OpSec but nation state adversaries have significantly greater resources than your average attacker, and thus require more significant security.

                                        1 Reply Last reply
                                        0
                                        • Z [email protected]
                                          This post did not contain any content.
                                          M This user is from outside of this forum
                                          M This user is from outside of this forum
                                          [email protected]
                                          wrote on last edited by
                                          #20

                                          As of March 2023, Pegasus operators were able to remotely install the spyware on iOS versions through 16.0.3 using a zero-click exploit. While the capabilities of Pegasus may vary over time due to software updates, Pegasus is generally capable of reading text messages, call snooping, collecting passwords, location tracking, accessing the target device's microphone and camera, and harvesting information from apps.

                                          This is consumer grade spyware built by Israeli intelligence and loaned out to just about everyone. Governments use this to hunt down activists and opposition party members.

                                          This Signal leak is one hole in the colander. Sure, water will leak through that hole. But water will also leak through all the other holes. And the countries collecting that water have more than what NSO Group contracts out.

                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups