last week security flaw finders at cryptowallet startup Zengo went public with ways to revive seemingly self-destructed View Once material.

zengo.com/whatsapps-view-once-

Essentially, the API servers treated View Once messages as normal messages but with a flag on them saying: Please only show this once. A rogue app able to talk to those servers could just ignore that request.

Zengo used Meta's bug bounty program in August to report the security weakness to WhatsApp....

and heard nothing back - As a result of the disclosure, WhatsApp tweaked its code a few days later to make it harder to get around the View Once requirements, and at first it appeared to have worked

"While generally the fix was a good initial step in the right direction by Meta’s WhatsApp, it is still not enough," Zengo cofounder Tal Be'ery wrote in an explainer on Monday.

medium.com/@TalBeerySec/whatsa

Follow

"The core issue of the View Once media message containing all the information required to view it, in an environment that should not be able to show it, still remains unsolved."

The video below shows this is not a terrifyingly complex feat to achieve.

youtu.be/uEG0mIdUSZ8

fundamental problem is that these supposedly evaporating messages are still being sent to platforms that shouldn't be getting them

¯\(°_o)/¯

i wouldn't trust any service that claims self destruct msgs will actually self destruct and be gone forever from everywhere..... Especially not Meta 😂

@ecksmc

All that's needed to neutralize and negate this type of "security" is a screen cap.

Sign in to participate in the conversation

CounterSocial is the first Social Network Platform to take a zero-tolerance stance to hostile nations, bot accounts and trolls who are weaponizing OUR social media platforms and freedoms to engage in influence operations against us. And we're here to counter it.