![]() ![]() “In general, when you would copy and paste in a Keybase chat, the folder would appear in (the uploadtemps) folder and then immediately get deleted,” Jackson told Security Ledger in a phone interview. First: Jackson discovered that images that were copy and pasted into Keybase chats were not reliably deleted from a temporary folder, /uploadtemps, associated with the client application. Zoom said it has fixed the flaw in the latest versions of its software for Windows, macOS and Linux.Īccording to researcher John Jackson of Sakura Samurai, the Keybase flaw manifested itself in two ways. ![]() The flaw was discovered by researchers from the group Sakura Samurai as part of a bug bounty program offered by Zoom, which acquired Keybase in May, 2020. However, it could put their security, privacy and safety at risk, especially for users living under authoritarian regimes in which apps like Keybase and Signal are increasingly relied on as a way to conduct conversations out of earshot of law enforcement or security services. The flaw in the encrypted messaging application ( CVE-2021-23827) does not expose Keybase users to remote compromise. ![]() Exclusive: Flaws in Zoom’s Keybase App Kept Chat Images From Being DeletedĪ serious flaw in Zoom’s Keybase secure chat application left copies of images contained in secure communications on Keybase users’ computers after they were supposedly deleted. ![]()
0 Comments
Leave a Reply. |