Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Explore the complete Signalgate scandal through this DEF CON 33 conference talk that unravels a major security breach involving high-level Trump administration officials. Discover how former national security advisor Mike Waltz accidentally invited a journalist into a sensitive Signal group chat with senior officials, leading to a cascade of security failures and revelations. Learn about the distinction between the legitimate Signal messaging app and the knock-off TM SGNL service that officials were actually using, developed by TeleMessage, a company founded by a former Israeli intelligence operative. Examine the technical analysis of TM SGNL's source code that exposes the company's false claims about end-to-end encryption support. Understand the dual security breaches that compromised TeleMessage's systems, including the trivial exploit used to extract data from their archive server and the subsequent exfiltration of hundreds of gigabytes of sensitive data. Analyze the implications of accessing plaintext messages and memory dumps containing chat logs from TeleMessage customers, while exploring how senior government officials' operational security failures led to congressional testimony issues and public exposure of classified communications practices.