Using “Signal” For Encrypted Chats, You Shouldn’t Skip Its Next Update

Share It On:

Through signals, many attackers are targeting your devices, and it directly or indirectly affects to your system as well so let’s know how the message would impact to your system.

The whistleblower Edward Snowden had shown several vulnerabilities in Signal. One would allow potential attackers to add random data to the attachments of encrypted messages sent by Android users, while on others, but would enable hackers to remotely execute malicious code on the targeted device. Besides, many confidential files of users are kept in Github and Google’s Official Play Store so that people are vulnerable to the attack of hackers.

The flaws in Android version of Signal include:

  1. Message authentication-bypass vulnerability
  2. A remote code execution vulnerability
  3. Crash bug

Similarly, the researcher Jean-Philippe Aumasson and Markus Vervier have discovered the message authentication-bypass vulnerability while reviewing the java code used by the signal for Android. It is sure that no one can do exploitable except the attackers or hackers who can we work on a signal server or a monitor data passing between signal users would be able to append pseudorandom data to the legitimate attachment. However, in the case of attachment, the signal does not verify the authenticity of the entire file; instead, it would allow hackers to attach pseudorandom data to the legitimate attachment.

Talking to Ars Technica, Aumasson said he found the integer overflow bug in the following line of code: int remainingData = (int) file.length () – mac.getMacLength();

  1. The value ‘file.length ()’ is a number encoded on 64 bits (of type ‘long’).
  2. The receiving variable ‘remainingData’ is a number encoded on 32 bits (of type ‘int’).

Even though signal uses end-to-end encryption to encrypt the messages on the sender’s device and decrypt it only on the receiver’s end, the encrypted messages still pass through a server, which would allow the hackers to carry out the message authentication bypass attack by hacking.

It is also known that Aumasson and Vervier are even now testing the same bugs in WhatsApp and Facebook Messanger to rely on signal code.


Share It On:

Recent Posts

Samsung Galaxy S25 Series: Introducing Multimodal AI Agents and Snapdragon® 8 Elite for Galaxy

Samsung Galaxy S25 Series: Introducing Multimodal AI Agents and Snapdragon®

Share It On:23rd January 2025, Kathmandu Samsung Electronics Co., Ltd announced the Galaxy S25 Ultra, Galaxy S25+, and Galaxy S25,

Kumari Bank Partners with Lumbini Medical College: Affordable Healthcare for Customers

Kumari Bank Partners with Lumbini Medical College: Affordable Healthcare for

Share It On: 23rd February 2025, Kathmandu In a strategic collaboration, Kumari Bank Limited has partnered with Lumbini Medical College

NRB Enforces Banking Discipline: BFIs Face Action for Governance, Lending, & Liquidity Risks

NRB Enforces Banking Discipline: BFIs Face Action for Governance, Lending,

Share It On:23rd January 2025, Kathmandu Nepal Rastra Bank (NRB) has taken action against four banking and financial institutions (BFIs)

Om Mega Shree IPO 2025: Details on Share Allocation & Application Process

Om Mega Shree IPO 2025: Details on Share Allocation &

Share It On: 23rd January 2025, Kathmandu Om Mega Shree Pharmaceuticals Limited will launch its initial public offering (IPO) on

Australian Ambassador Leann Johnston Visits Mid-West University in Nepal

Australian Ambassador Leann Johnston Visits Mid-West University in Nepal

Share It On:23rd January 2024, Kathmandu Her Excellency Leann Johnston, Ambassador of Australia to Nepal, visited Mid-West University on January

FAO’s New Office in Janakpur to Improve Food Security and Rural Livelihoods

FAO’s New Office in Janakpur to Improve Food Security and

Share It On:23rd January 2024, Kathmandu Nepal’s Food and Agriculture Organization (FAO) has officially inaugurated its first regional office in