0-click deanonymization attack targeting Signal, Discord, other platforms

What the attack actually does

  • Exploit uses Signal/Discord image attachments hosted on Cloudflare.
  • Sender uploads a unique image; victim’s client auto-downloads it (e.g., for previews/notifications).
  • Attacker later probes Cloudflare POPs to see where the image is cached (via headers, timing, or VPN probes).
  • This yields the Cloudflare datacenter(s) closest (in routing terms) to the victim, giving a coarse location.

How “deanonymizing” is this?

  • Many commenters argue “deanonymization” is overstated:
    • Typical accuracy ~150–250 miles, sometimes worse due to peering quirks or roaming.
    • POPs often serve very large regions and traffic may exit via a different country.
  • Others say even coarse country/region can be highly sensitive:
    • E.g., confirming someone is in a particular country, city cluster, or still “in-country.”
    • Repeated pings can reveal travel patterns and be cross‑referenced with other data.

Threat models and real-world use cases

  • For most users, threat model is “stop big tech from reading content,” not “defeat nation‑states.”
  • Several point out serious users (whistleblowers, dissidents, activists) might wrongly assume stronger anonymity from Signal.
  • Suggested uses:
    • Narrowing a suspect list when combined with travel/immigration data.
    • Detecting moles in groups by spotting out‑of‑region members.
    • Correlating multiple identities that move together.

Mitigations and app design choices

  • User-side:
    • Always-on VPN/Tor largely defeats the attack, though mobile VPN behavior (esp. iOS, sleep, push) is debated.
    • Disable media auto-download and rich previews; this turns 0‑click into 1‑click.
  • App-side proposals:
    • Don’t auto-download from unknown contacts or for notifications.
    • Disable CDN caching or use per-recipient encrypted blobs/URLs (trade-off: cost and complexity).
    • Existing padding of attachments (Signal dev confirms) doesn’t prevent this specific side channel.

Role of Cloudflare and CDNs

  • Some blame Cloudflare for exposing cache status/POP IDs; others note timing side channels would still exist.
  • Cloudflare reportedly patched the ability to target arbitrary POPs from Workers, but the attack can still be approximated via VPN-based probing.
  • Underlying issue is structural: centralized CDNs see IPs and metadata; law enforcement could subpoena logs.

Meta discussion

  • Many praise the technical work and write-up, but see the title and language as somewhat sensational.
  • Debate over whether Signal appropriately dismissed the report and whether its “privacy by default” marketing overpromises anonymity.