Signal CEO hacks Cellebrite cellphone hacking, cracking tool

Signal CEO hacks Cellebrite cellphone hacking, cracking tool

Moxie Marlinspike, CEO of Signal states that since Cellebrite itself makes a living from undisclosed vulnerabilities, he decided to disclose the vulnerability to the public rather than informing the company.

In December 2020, Cellebrite claimed that it could easily crack Signal’s encryption. However, it seems like tables have turned for the Israel-based software maker since Signal has found vulnerabilities in Cellebrite’s software.


SEE: Cellebrite Our new tool unlocks almost any iOS or Android device


In a damning blog post from Signal, CEO Moxie Marlinspike wrote that Cellebrite hadn’t cared much about its own software security as it can be easily manipulated in many ways. For instance, the CEO stated that industry-standard exploit mitigation defenses are unavailable, making the software vulnerable to exploitation.



“Until Cellebrite is able to accurately repair all vulnerabilities in its software with extremely high confidence, the only remedy a Cellebrite user has is to not scan devices,” Marlinspike wrote.



It is worth noting that the Signal app is a privacy-focused encrypted smartphone messenger app endorsed by Mr. Edward Snowden, the ex-NSA whistleblower.


Checkmate for Cellebrite??


Generally, when security vulnerabilities are identified, the issue is first disclosed to the software maker for fixing, and then it is made public under the responsible disclosure rule. However, Marlinspike states that Cellebrite itself makes a living from undisclosed vulnerabilities, so he decided to play it smart with the company.



“We are of course willing to responsibly disclose the specific vulnerabilities we know about to Cellebrit ..

Support the originator by clicking the read the rest link below.