cross-posted from: https://lemmy.ca/post/37638868 !privacy@lemmy.dbzer0.com
This affects Signal too
An issue with Cloudflare allows an attacker to find which Cloudflare data center a messaging app used to cache an image, meaning an attacker can obtain the approximate location of Signal, Discord, Twitter/X, and likely other chat app users. In some cases an attacker only needs to send an image across the app, with the target not clicking it, to obtain their location.
https://gist.github.com/hackermondev/45a3cdfa52246f1d1201c1e8cdef6117?ref=404media.co
Signal, an open-source encrypted messaging service, is widely used by journalists and activists for its privacy features. Internally, the app utilizes two CDNs for serving content: cdn.signal.org (powered by CloudFront) for profile avatars and cdn2.signal.org (powered by Cloudflare) for message attachments.
i think this would be true of basically any large service that had multiple data centers. whichever one catches your data is the one closest to you.
the difficulty is accessing that data even if you can’t read it you still have the closest location.
sounds to me like the Internet working as intended. if you want true privacy you need to take extra steps
On the one hand, deanonimization attacks are never entirely avoidable on unhardened targets and this one isn’t particularly sophisticated and leaks relatively little information.
On the other hand deanonimization attacks are always bad and it’s a good reminder to people of the risks they are taking. This is also slightly non-obvious behavior, even if it makes sense to the technically competent, as something like an IP grabber normally requires user interaction such as clicking a link. It’s also a vector that CF might be able to mitigate by patching the ability to query a given cache directly.
they should be able to patch that as long as nothing relies on it working as is
I don’t want to be a contrairian, but your cellphone carrier does this non stop. Cloudflare is not a good company, but this is the least of your problems.
deleted by creator
I support this because most all cloudflare websites require browser fingerprinting otherwise they will not serve you the page. The moment I enable the jShelter addon, I am cut off from a significant portion of the internet
CF is DNS you could be using it a lot and never know
I have a pihole serving DNS for my local network that is configured to use unfiltered Quad9 for upstream.
ok, you are certainly not a common user.
oh no, now they nkow I’m in the US North East, assuming I’m not using a VPN…
Another reason why Cloudflare sucks.
deleted by creator
deleted by creator
deleted by creator
deleted by creator
deleted by creator
deleted by creator
deleted by creator