Deleted Keybase chat images retrievable on Windows, macOS, Linux

Deleted Keybase chat images retrievable on Windows, macOS, Linux

Keybase is owned by Zoom and currently has almost half a million privacy-focused users.


John Jackson and researchers at Sakura Samurai have identified a flaw in the Keybase app. The app is regarded as one of the best for encrypted communication. This feature-rich app offers comprehensive privacy and security. However, Jackson reported in the company’s latest report that the bug could compromise Keybase users’ privacy.


Bug Affects Keybase App’s Picture Storing Mechanism


According to Jackson and his team, the bug carries the identifier CVE-2021-23827. It impacts the app’s cleartext image storing cache and is found in all desktop versions of the app across all platforms, including Windows, Mac, and Linux.


The Problem?


In the Keybase app, under normal circumstances, after deleting a picture or enabling the explode feature, which activates time-based deletion of images, the pictures are expected to be wiped from the app’s cache.

However, despite showing them as deleted, the pictures were neither removed on the local cache nor from the “uploadtemps” directories due to the bug. This means the images were still retrievable in cleartext format.


According to a blog post published by researchers, the bug also prevents the “uploadtemps” folder from getting immediately wiped, as it usually happens. Typically, the folder remains alive on the local storage until the image uploading action lasts.



Keybase’ Uploadtemps folder – Image: John J Hacking


1 of 3

Potential Dangers


If an attacker can establish local access on the device, they can easily access files, which the user believes have ..

Support the originator by clicking the read the rest link below.