Close Menu
TechurzTechurz

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Do you really need smart home display hub? I tried one, and it made a big difference

    August 29, 2025

    Why Most Entrepreneurs Are Approaching YouTube the Wrong Way

    August 29, 2025

    Why the wireless mic I recommend to content creators is made by a drone company

    August 29, 2025
    Facebook X (Twitter) Instagram
    Trending
    • Do you really need smart home display hub? I tried one, and it made a big difference
    • Why Most Entrepreneurs Are Approaching YouTube the Wrong Way
    • Why the wireless mic I recommend to content creators is made by a drone company
    • The government just made it harder for you to weigh in on federal rules
    • Rune Elmqvist: Inkjet Printers, Implantable Pacemakers
    • Why CEOs Should Incentivize Employees To Replace Themselves With AI
    • 9 Dinge, die CISOs den Job kosten
    • From pilot to scale: Making agentic AI work in health care
    Facebook X (Twitter) Instagram Pinterest Vimeo
    TechurzTechurz
    • Home
    • AI
    • Apps
    • News
    • Guides
    • Opinion
    • Reviews
    • Security
    • Startups
    TechurzTechurz
    Home»Security»The Signal Clone Mike Waltz Was Caught Using Has Direct Access to User Chats
    Security

    The Signal Clone Mike Waltz Was Caught Using Has Direct Access to User Chats

    TechurzBy TechurzMay 6, 2025No Comments4 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    The Signal Clone Mike Waltz Was Caught Using Has Direct Access to User Chats
    Share
    Facebook Twitter LinkedIn Pinterest Email

    The communication app TeleMessage Signal, used by at least one top Trump administration official to archive messages, has already reportedly suffered breaches that illustrate concerning security flaws and resulted in its parent company imposing a service pause this week pending investigation. Now, according to detailed new findings from the journalist and security researcher Micah Lee, TM Signal’s archiving feature appears to fundamentally undermine Signal’s flagship security guarantees, sending messages between the app and a user’s message archive without end-to-end encryption, thus making users’ communications accessible to TeleMessage.

    Lee conducted a detailed analysis of TM Signal’s Android source code to assess the app’s design and security. In collaboration with 404 Media, he had previously reported on a hack of TM Signal over the weekend, which revealed some user messages and other data—a clear sign that at least some data was being sent unencrypted, or as plaintext, at least some of the time within the service. This alone would seem to contradict TeleMessage’s marketing claims that TM Signal offers “End-to-End encryption from the mobile phone through to the corporate archive.” But Lee says that his latest findings show that TM Signal is not end-to-end encrypted and that the company could access the contents of users’ chats.

    “The fact that there are plaintext logs confirms my hypothesis,” Lee tells WIRED. “The fact that the archive server was so trivial for someone to hack, and that TM Signal had such an incredible lack of basic security, that was worse than I expected.”

    TeleMessage is an Israeli company that completed its acquisition last year by the US-based digital communications archiving company Smarsh. TeleMessage is a federal contractor, but the consumer apps it offers are not approved for use under the US government’s Federal Risk and Authorization Management Program, or FedRAMP.

    Smarsh did not return WIRED’s requests for comment about Lee’s findings. The company said on Monday, “TeleMessage is investigating a potential security incident. Upon detection, we acted quickly to contain it and engaged an external cybersecurity firm to support our investigation.”

    Lee’s findings are likely significant for all TeleMessage users but have particular significance given that TM Signal was used by President Donald Trump’s now-former national security adviser Mike Waltz. He was photographed last week using the service during a cabinet meeting, and the photo appeared to show that he was communicating with other high-ranking officials, including Vice President JD Vance, US Director of National Intelligence Tulsi Gabbard, and what appears to be US Secretary of State Marco Rubio. TM Signal is compatible with Signal and would expose messages sent in a chat with someone using TM Signal, whether all participants are using it or some are using the genuine Signal app.

    Lee found that TM Signal is designed to save Signal communication data in a local database on a user’s device and then send this to an archive server for long-term retention. The messages, he says, are sent directly to the archive server, seemingly as plaintext chat logs in the cases examined by Lee. Conducting the analysis, he says, “confirmed the archive server has access to plaintext chat logs.”

    Data taken from the TeleMessage archive server in the hack included chat logs, usernames and plaintext passwords, and even private encryption keys.

    In a letter on Tuesday, US senator Ron Wyden called for the Department of Justice to investigate TeleMessage, alleging that it is “a serious threat to US national security.”

    “The government agencies that have adopted TeleMessage Archiver have chosen the worst possible option,” Wyden wrote. “They have given their users something that looks and feels like Signal, the most widely trusted secure communications app. But instead, senior government officials have been provided with a shoddy Signal knockoff that poses a number of serious security and counterintelligence threats. The security threat posed by TeleMessage Archiver is not theoretical.”

    Access Caught Chats clone Direct Mike Signal User Waltz
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleDoes Marvel’s ‘Thunderbolts*’ Have a Post-Credits Scene?
    Next Article Soundboks is giving away accessories when you buy a Bluetooth speaker
    Techurz
    • Website

    Related Posts

    Security

    Why the wireless mic I recommend to content creators is made by a drone company

    August 29, 2025
    Security

    9 Dinge, die CISOs den Job kosten

    August 29, 2025
    Security

    Samsung offers enticing preorder deal for new Galaxy tablets ahead of September Unpacked

    August 29, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Start Saving Now: An iPhone 17 Pro Price Hike Is Likely, Says New Report

    August 17, 20258 Views

    You Can Now Get Starlink for $15-Per-Month in New York, but There’s a Catch

    July 11, 20257 Views

    Non-US businesses want to cut back on using US cloud systems

    June 2, 20257 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    Start Saving Now: An iPhone 17 Pro Price Hike Is Likely, Says New Report

    August 17, 20258 Views

    You Can Now Get Starlink for $15-Per-Month in New York, but There’s a Catch

    July 11, 20257 Views

    Non-US businesses want to cut back on using US cloud systems

    June 2, 20257 Views
    Our Picks

    Do you really need smart home display hub? I tried one, and it made a big difference

    August 29, 2025

    Why Most Entrepreneurs Are Approaching YouTube the Wrong Way

    August 29, 2025

    Why the wireless mic I recommend to content creators is made by a drone company

    August 29, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer
    © 2025 techurz. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.