Tuesday, December 1, 2015

Android Telegram is not soooo safe as we promised – unocero

A fairly astute developer released a security vulnerability version Android Telegram . Flisbäck Ola explains that when downloading an interface third line of code, an attacker can quickly open a whole load of application metadata that could be used to identify who you’re talking about.

Although requires some extra detective work, if your configuration shows when you were seen online for the last time, the attacker, who just need to know your phone number in order to start accessing this information, you can begin to find out who you’re texting; and that Telegram Android does not require you to accept someone as a contact to add it to your address book, so that at any time you would realize the action of the hacker.

Apparently, vulnerability It works particularly well if the victim and the attacker have contacts in common, allowing the wrongdoer to reduce the list of possible people involved in the conversation or not to see who is online at any given time. Fortunately, developers Telegram have a quick solution to this problem

To activate, just need to limit the visibility of the state in Settings & gt;. & Gt Privacy and security; last connection. By changing these settings metadata access you will be restricted to use either official or a client application developed by a third party. Yet Telegram programmers are already working on a patch for users requiring no change these options because when activated, can not see when other people are online

Reference:. GitHub

LikeTweet

No comments:

Post a Comment