• .Donuts@lemmy.world
    link
    fedilink
    English
    arrow-up
    11
    ·
    6 hours ago

    so it’s not really zero click

    Did you keep reading after the intro?

    Excerpt:

    If the target has push notifications enabled (which it is by default), they don’t even have to open the Signal conversation for their device to download the attachment. Once the push notification is sent to their device, it automatically downloads the image from Signal’s CDN triggering the local datacenter to cache the response.

    An attacker can run this deanonymization attack any time and grab a user’s current location without a single interaction.

      • Aatube@kbin.melroy.org
        link
        fedilink
        arrow-up
        1
        ·
        5 hours ago

        GeoGuesser, powered by the Google Maps API, generates a likely location of the user. It finds the midpoint between the 2 datacenters and draws 2 circles that signify his radius.

        • infeeeee@lemm.ee
          link
          fedilink
          English
          arrow-up
          2
          ·
          3 hours ago

          And with SS7 they can get even more precise location, and you can’t really hide from that if you want to use a phone with a phone number, what is the point. This is an interesting way of attack, noone really thought about this before, but it’s not “oh-my-god everyone can be tracked via signal”. I guess the closest server doesn’t even selected via geographical distance, but much more depends on network infrastructure of your location, so Google Maps API can’t really help here.

          And again any VPN could defend against this, so if you want to hide which country you are in currently, it should be the 0th step to use a VPN.