So, basically a very approximate location detection exploit using cloudflare caching servers. I wouldn't say it's "deanonymizing" but may spook someone.
nice work!
so basically the only way to protect yourself aside from a VPN is to disable friend requests in Discord and to disable being found by a phone number in signal?
very cool write up. i wonder how this would affect the desktop client if you just send an image, would it be 0 click as well? or do you need to get in the notifications tab for the image to get loaded
Very approximate location, with high dependence on Cloudlare DCs location
Provides wrong data when target uses VPN
Nevertheless, an interesting research and approach to try and get some potentially useful data @hackermondev 👏
So this is using rough geolocation based on cache from the CDN. This could be easily mitigated by simply using a VPN if I'm understanding all this correctly.
Yet another "security researcher" doesn't understand the difference between privacy and anonymity. No deanonymization happens either, clickbait for clout.