The app, called Tchap, is the French government’s attempt to provide a more secure communication channel for its employees
LinkedIn say that it’s not their data leak – however, they are aware that it’s out there on the internet.
It was revealed that hackers could see usernames, email addresses, subject lines, and folder names.
Cloudflare claims that its Warp VPN will not write any user-identifiable log data to disk, will purge all debug logs within 24 hours, and will not require any personally identifiable information to start using the service.
Current estimates are that 75 billion connected IoT devices will be in use by 2025, in other words, they will continue to provide ever bigger and more appealing attack vectors to hackers.
Imperva security researcher Ron Masas’ proof-of-concept showed that the photos’ metadata could be discovered by taking advantage of the flaw.
It is well known that China monitors conversations and social media accounts of its citizens.
This follows Facebook pushing users to submit their phone number in order to secure their account via two-factor authentication last year.
When such backdoors are placed in what was supposed to be end-to-end encrypted system, the user data is no longer completely encrypted and is more likely to be targeted cyber attacks.