How (almost) any phone number can be tracked via WhatsApp & Signal – open-source PoC - WhatsApp & Signal Vulnerability
![]() |
I’ve been playing with the “Careless Whisper” side-channel idea and hacked together a small PoC that shows how you can track a phone’s device activity state (screen on/off, offline) via WhatsApp – without any notifications or visible messages on the victim’s side. How it works (very roughly): From that, you start seeing patterns like: *depends on device The target never sees any message, notification or reaction. The same class of leak exists for Signal as well (per the original paper). In theory you’d still see this in raw network traffic (weird, regular probe pattern), and on the victim side it will slowly burn through a bit more mobile data and battery than “normal” idle usage. Over time you can use this to infer behavior: So in theory you can slowly build a profile of when a person is home, asleep, or out — and this kind of tracking could already be happening without people realizing it. Quick “hotfix” for normal users: My open-source implementation (research / educational use only): https://github.com/gommzystudio/device-activity-tracker Original Paper: [link] [comments] |
from hacking: security in practice https://ift.tt/DyRYevA

Comments
Post a Comment