Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

We Are Currently Clean on OPSEC - The Signalgate Saga

DEFCONConference via YouTube

Overview

Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Explore the complete Signalgate scandal through this DEF CON 33 conference talk that unravels a major security breach involving high-level Trump administration officials. Discover how former national security advisor Mike Waltz accidentally invited a journalist into a sensitive Signal group chat with senior officials, leading to a cascade of security failures and revelations. Learn about the distinction between the legitimate Signal messaging app and the knock-off TM SGNL service that officials were actually using, developed by TeleMessage, a company founded by a former Israeli intelligence operative. Examine the technical analysis of TM SGNL's source code that exposes the company's false claims about end-to-end encryption support. Understand the dual security breaches that compromised TeleMessage's systems, including the trivial exploit used to extract data from their archive server and the subsequent exfiltration of hundreds of gigabytes of sensitive data. Analyze the implications of accessing plaintext messages and memory dumps containing chat logs from TeleMessage customers, while exploring how senior government officials' operational security failures led to congressional testimony issues and public exposure of classified communications practices.

Syllabus

DEF CON 33 - 'We are currently clean on OPSEC' - The Signalgate Saga - Micah 'micahflee' Lee

Taught by

DEFCONConference

Reviews

Start your review of We Are Currently Clean on OPSEC - The Signalgate Saga

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.