Just a sample of the Echomail archive
Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.
|    CONSPRCY    |    How big is your tinfoil hat?    |    2,445 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 2,219 of 2,445    |
|    Mike Powell to All    |
|    Security researchers warn    |
|    15 Jan 26 09:39:42    |
      TZUTC: -0500       MSGID: 1977.consprcy@1:2320/105 2dce39e7       PID: Synchronet 3.21a-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0       TID: SBBSecho 3.28-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0       BBSID: CAPCITY2       CHRS: ASCII 1       FORMAT: flowed       Security researchers warn Telegram links can doxx you even with a VPN              Date:       Wed, 14 Jan 2026 14:57:51 +0000              Description:       A simple click on a disguised link could reveal your real IP address to       attackers. Researchers warn that this Telegram flaw overrides internal proxy       and VPN settings, putting privacy-focused users at risk.              FULL STORY              Security researchers have uncovered a new one-click vulnerability that forces       the Telegram mobile app to leak your real IP address. Even using the best VPN       apps might not be enough to stop it if your settings aren't watertight.               The flaw, identified by security researcher 0x6rss , affects both Android and       iOS versions of the app. It revolves around how Telegram handles proxy       settings, a feature often used by people in restrictive regions to bypass       censorship.               By disguising a malicious proxy link as a harmless username or website URL,       attackers can trick the app into "pinging" a server they control. This       connection happens automatically and, critically, occurs outside of the       encrypted tunnel users rely on to stay anonymous.              How Telegram's 'one-click' leak works              The vulnerability is triggered the moment a user clicks a specially crafted       t.me link. While these links can look like standard user profiles, they       actually point to a proxy configuration. When clicked, Telegram attempts to       verify the quality of the proxy connection by sending a test request (a       "ping") to the server.               The researcher found that this specific request bypasses all configured       proxies and tunnels within the app. As a result, the connection is made via       the device's native network stack, directly from the user's device, instantly       logging their real IP address on the attackers server.              The proof-of-concept code is now publicly available on GitHub .               What makes this particularly dangerous is the "one-click" nature of the       exploit. There is no second confirmation screen or warning before the ping is       sent. Once the link is tapped, the damage is done.               For activists, journalists, and whistleblowers who rely on Telegram for       anonymity, this exposes their approximate physical location and ISP details        to potential bad actors.              Can a VPN protect you?               The researcher noted that the request "bypasses all configured proxies,"       ignoring active SOCKS5, MTProto, or VPN setups specifically configured within       the Telegram app settings.               Because the app initiates this specific connection request directly through       the device's network interface, it can potentially leak data even when       protective tools are active.               While a system-wide VPN with a strict kill switch should theoretically catch       this traffic, the specific behavior of this flaw creates a significant risk       that traffic could slip through the net, particularly if the user relies on       split-tunneling features.              Telegram's response               Telegram has historically downplayed similar findings, often stating that        "any website or proxy owner can see the IPs" of visitors, framing it as a       standard function of how the internet works.               However, following scrutiny over this specific bypass, the company told       Bleeping Computer that it intends to address the user interface aspect of the       flaw.               Telegram is expected to add a warning prompt to these specific links in a       future update, allowing users to spot disguised proxies and decline the       connection before the automatic ping is sent.              What you can do               Until Telegram releases a patch to fix this automatic pinging behavior, users       are advised to be extremely cautious when clicking links from unknown        sources, even if they appear to be internal Telegram usernames. Avoid        clicking t.me links from strangers or in public channels. Check link previews       carefully before tapping. Ensure your system-wide VPN is active and        configured to block all non-VPN traffic (Kill Switch enabled) rather than       relying solely on Telegrams internal proxy settings.               Telegram has yet to issue a formal date for this fix, but as scrutiny mounts,       a security update is likely on the horizon. For now, the safest course of       action is to treat every link with suspicion.               ======================================================================       Link to news story:       https://www.techradar.com/vpn/vpn-privacy-security/security-researchers-warn-t       elegram-links-can-doxx-you-even-with-a-vpn              $$       --- SBBSecho 3.28-Linux        * Origin: Capitol City Online (1:2320/105)       SEEN-BY: 105/81 106/201 128/187 129/14 305 153/7715 154/110 218/700       SEEN-BY: 226/30 227/114 229/110 134 206 300 307 317 400 426 428 470       SEEN-BY: 229/664 700 705 266/512 291/111 320/219 322/757 342/200 396/45       SEEN-BY: 460/58 633/280 712/848 902/26 2320/0 105 304 3634/12 5075/35       PATH: 2320/105 229/426           |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca