[liberationtech] Signal ignores proxy censorship vulnerability, bans researchers

Bill Woodcock woody at pch.net
Mon Feb 8 10:24:43 CET 2021



> On Feb 8, 2021, at 5:08 AM, Yosem Companys <ycompanys at gmail.com> wrote:
> The claims in this article are concerning if true.
> "...multiple researchers have now discovered flaws in the workaround that can let a censor or government authority probe into Signal TLS proxies, rendering these protections moot and potentially bringing repercussions for Signal users located in repressive regimes.
> 
> The researchers who reported these flaws via Signal's GitHub repository have been banned by the company with their reported issues removed.
> 
> https://www.bleepingcomputer.com/news/security/signal-ignores-proxy-censorship-vulnerability-bans-researchers/"

Too late, the next round of quashing-this-dissent has played out:

Removal Notice: On February 7th, 2021, BleepingComputer published an article on a potential security issue impacting Signal's proposed temporary censorship workaround.

Fortunately for all of us, we have the good folks at the Internet Archive:

https://web.archive.org/web/20210207090023/https://www.bleepingcomputer.com/news/security/signal-ignores-proxy-censorship-vulnerability-bans-researchers/


                                -Bill

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.ghserv.net/pipermail/lt/attachments/20210208/5b834132/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: Message signed with OpenPGP
URL: <http://lists.ghserv.net/pipermail/lt/attachments/20210208/5b834132/attachment.sig>


More information about the LT mailing list