Oops! National Security Blunder: How a Fake Signal App Became a Hacker’s Dream in Just 20 Minutes
Mike Waltz was caught using a Signal app clone, TM SGNL, at a cabinet meeting. Unfortunately, it was about as secure as a screen door on a submarine. A hacker accessed sensitive data in just 20 minutes, revealing that even national security advisers need a tech-savvy friend—or at least a better app.

Hot Take:
What’s the point of having a secret messaging app if it just leaks like a sieve at the first sign of a hacker? Mike Waltz’s undercover texting game was weaker than a decaf espresso. You’d think the security adviser to the president would know better than to use an app that’s as secure as a screen door on a submarine. TeleMessage might as well have been called TellEverybody. Maybe they should have used smoke signals instead—they’d probably be more secure!
Key Points:
– Mike Waltz was caught using a Signal clone, TeleMessage Signal, which archives messages.
– A hacker compromised TeleMessage’s servers in about 15 to 20 minutes.
– TeleMessage was using outdated security practices, like MD5 hashing.
– The hack exposed sensitive data, including user credentials and chat logs.
– The vulnerability was due to misconfigured server settings in an outdated Spring Boot framework.