Get the latest tech news

TeleMessage Explorer: a new open source research tool


I've spent the last week or two writing code to make sense of the massive hack of data from TeleMessage, the comically insecure company that makes a modified Signal app that Trump's former national security advisor Mike Waltz was caught using. I've decided to publish my code as open source

Back in 2020, in the middle of the Black Lives Matter uprising, someone hacked hundreds of law enforcement websites and exfiltrated about 270 GB of data. If you want to dig into secret 2020-era docs from your local police intelligence agency yourself, I recommend reading my book (which is available for free online, though I'd appreciate if you buy a copy), and particularly these chapters: Finally, the "cruncher" part of the code will read all of the heap dump strings files, search for relevant JSON objects, and insert them into the database.

Get the Android app

Or read this on Hacker News

Read more on:

Photo of TeleMessage

TeleMessage

Photo of TeleMessage Explorer

TeleMessage Explorer

Photo of source research tool

source research tool

Related news:

News photo

TeleMessage security SNAFU worsens as 60 government staffers exposed

News photo

DDoSecrets publishes 410 GB of heap dumps, hacked from TeleMessage

News photo

Israeli App on Mike Waltz’s Phone Exposed User’s Passwords | The Signal Archive app TeleMessage exposed user emails and passwords, due to a misconfigured “secure” portal on its website.