Up until recently, Signal Desktop used a function called "dangerouslySetInnerHTML()" https://github.com/signalapp/Signal-Desktop/commit/4e5c8965ff72576a9e20850dd30d9985f4073192#diff-f8bba204372da85d8cceed81278b7eecR116 … , which resulted in a RCE vulnerability. Who could have predicted that this was perhaps not wise?
0 replies
1 retweet
0 likes
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.