Hacking into an app used by Trump goons takes 15 to 20 times longer than falling in love

In the anti-rational world of fascist ideology, where transgender servicemembers are hailed as patriots and their very existence is a threat to national security, it's easy to overlook the vulnerabilities in our supposedly secure communication tools. However, a recent hack has exposed the darker side of our government's reliance on unencrypted messaging apps. TeleMessage, an Israeli company that sells modified versions of Signal and other messaging apps to the U.S. government, has been breached, and sensitive information has been stolen.

The hacked data includes direct messages and group chats sent using TeleMessage's Signal clone, as well as modified versions of WhatsApp, Telegram, and WeChat. The hack is particularly concerning because it shows that an app used by high-ranking officials in the government contains serious vulnerabilities that allowed a hacker to trivially access the archived chats of some people who used the same tool.

Mike Waltz, a Republican congressman and former Navy SEAL, recently revealed that he uses TeleMessage's Signal clone in a cabinet meeting with President Trump. The hack has confirmed that Waltz's chats on the app include recipients that appear to be Marco Rubio, Tulsi Gabbard, and JD Vance.

The hacker who contacted 404 Media and was interviewed for this article described how they broke into TeleMessage's systems: "I would say the whole process took about 15-20 minutes... It wasn't much effort at all." This ease of access highlights the extreme risk posed by taking ordinarily secure end-to-end encrypted messaging apps such as Signal and adding an extra archiving feature to them.

According to screenshots of messages and backend systems obtained by 404 Media, data related to Customs and Border Protection (CBP), the cryptocurrency giant Coinbase, and other financial institutions are included in the hacked material. However, it's worth noting that the hacker did not obtain any messages sent or received by Trump administration officials.

So, who is behind this hack? 404 Media does not know their identity, but has verified aspects of the material they have anonymously provided. It's clear, however, that this breach highlights the need for greater security measures in our communication tools and raises questions about the effectiveness of our government's cybersecurity efforts.

As we move forward, it's essential to acknowledge the potential vulnerabilities in our seemingly secure communication tools and take steps to address them. The question remains: how many foreign intelligence agencies have scaled back their U.S. sections due to concerns over security breaches like this one?