Replying to @hackermondev
have you looked into whether the use of Cloudflare's "Tiered Cache" feature mitigate this?
1
33
it does not. Discord uses this and I was still able to run the attack on their CDN
1
61
Replying to @hackermondev
Very cool stuff. +1 kitty cat
331
Replying to @hackermondev
So, basically a very approximate location detection exploit using cloudflare caching servers. I wouldn't say it's "deanonymizing" but may spook someone.
5
4
238
Replying to @hackermondev
nice work! so basically the only way to protect yourself aside from a VPN is to disable friend requests in Discord and to disable being found by a phone number in signal?
2
16
Replying to @hackermondev
wow, nice find, and incredible writeup. you got a bright future dude
3
Replying to @hackermondev
Nice work, Daniel. :)
2
Replying to @hackermondev
Thanks... Crazy af but thanks
2
Replying to @hackermondev
nice work, daniel!
2
Replying to @hackermondev
nice work
2
Replying to @hackermondev
Cool work!
1
Replying to @hackermondev
This goes way deeper when you start looking at phone OS Push Server locations. ;)
1
Replying to @hackermondev
Very cool! Great to see such high calibre of research from a 15 year old.
Replying to @hackermondev
Impressive, very nice work
Replying to @hackermondev
Don't worry, crime is legal now. Ross is gonna set up a new silk road as an Amazon store.
Replying to @hackermondev
super cool writeup, and disapointed by signal's response. was expecting better from a privacy focused app
5
45
Replying to @hackermondev
very cool write up. i wonder how this would affect the desktop client if you just send an image, would it be 0 click as well? or do you need to get in the notifications tab for the image to get loaded
20
Replying to @hackermondev
Mitigated with this one weird trick
9
Replying to @hackermondev
Not a "0-click deanonymization" if its just knowing what cloudflare proxy server you use.
6
Replying to @hackermondev
really cool shit
4
Replying to @hackermondev
Very approximate location, with high dependence on Cloudlare DCs location Provides wrong data when target uses VPN Nevertheless, an interesting research and approach to try and get some potentially useful data @hackermondev 👏
4
Replying to @hackermondev
So this is using rough geolocation based on cache from the CDN. This could be easily mitigated by simply using a VPN if I'm understanding all this correctly.
1
4
Replying to @hackermondev
nothingburger but good try
4
This tweet is unavailable
Replying to @hackermondev
is it patched or nah
1
3
Replying to @hackermondev
You're cracked dude, neat writeup, thanks for sharing
1
2
Replying to @hackermondev
This is clever! Nice work
2
Replying to @hackermondev
Yet another "security researcher" doesn't understand the difference between privacy and anonymity. No deanonymization happens either, clickbait for clout.
2
Replying to @hackermondev
very clever bug! never thought of misusing cloudflare caching this way
1
1
Replying to @hackermondev
Great stuff! You have a bright future Daniel
1