[liberationtech] Signal ignores proxy censorship vulnerability, bans researchers
Bill Woodcock
woody at pch.net
Mon Feb 8 10:24:43 CET 2021
> On Feb 8, 2021, at 5:08 AM, Yosem Companys <ycompanys at gmail.com> wrote:
> The claims in this article are concerning if true.
> "...multiple researchers have now discovered flaws in the workaround that can let a censor or government authority probe into Signal TLS proxies, rendering these protections moot and potentially bringing repercussions for Signal users located in repressive regimes.
>
> The researchers who reported these flaws via Signal's GitHub repository have been banned by the company with their reported issues removed.
>
> https://www.bleepingcomputer.com/news/security/signal-ignores-proxy-censorship-vulnerability-bans-researchers/"
Too late, the next round of quashing-this-dissent has played out:
Removal Notice: On February 7th, 2021, BleepingComputer published an article on a potential security issue impacting Signal's proposed temporary censorship workaround.
Fortunately for all of us, we have the good folks at the Internet Archive:
https://web.archive.org/web/20210207090023/https://www.bleepingcomputer.com/news/security/signal-ignores-proxy-censorship-vulnerability-bans-researchers/
-Bill
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.ghserv.net/pipermail/lt/attachments/20210208/5b834132/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: Message signed with OpenPGP
URL: <http://lists.ghserv.net/pipermail/lt/attachments/20210208/5b834132/attachment.sig>
More information about the LT
mailing list