3 months ago, I discovered a unique 0-click deanonymization attack that allows an attacker to grab the location of any target within a 250 mile radius. With a vulnerable app installed on a target’s phone (or as a background application on their laptop), an attacker can send a malicious payload and deanonymize you within seconds–and you wouldn’t even know.

I’m publishing this writeup and research as a warning, especially for journalists, activists, and hackers, about this type of undetectable attack. Hundreds of applications are vulnerable, including some of the most popular apps in the world: Signal, Discord, Twitter/X, and others. Here’s how it works:

  • CameronDev
    link
    fedilink
    English
    arrow-up
    5
    ·
    4 days ago

    Doesn’t even guarantee physical location, only the location of their VPN endpoint.

      • CameronDev
        link
        fedilink
        English
        arrow-up
        1
        ·
        4 days ago

        Do any of the good VPN providers leak DNS? Most VPNs claim to allow evading geolocation, if they leaked DNS that wouldnt be true?