Bitget App
Trade smarter
Buy cryptoMarketsTradeFuturesEarnWeb3SquareMore
Trade
Spot
Buy and sell crypto with ease
Margin
Amplify your capital and maximize fund efficiency
Onchain
Going Onchain, without going Onchain!
Convert & block trade
Convert crypto with one click and zero fees
Explore
Launchhub
Gain the edge early and start winning
Copy
Copy elite trader with one click
Bots
Simple, fast, and reliable AI trading bot
Trade
USDT-M Futures
Futures settled in USDT
USDC-M Futures
Futures settled in USDC
Coin-M Futures
Futures settled in cryptocurrencies
Explore
Futures guide
A beginner-to-advanced journey in futures trading
Futures promotions
Generous rewards await
Overview
A variety of products to grow your assets
Simple Earn
Deposit and withdraw anytime to earn flexible returns with zero risk
On-chain Earn
Earn profits daily without risking principal
Structured Earn
Robust financial innovation to navigate market swings
VIP and Wealth Management
Premium services for smart wealth management
Loans
Flexible borrowing with high fund security
Shenyu: Cloud input methods with up to one billion users may have leaked input content. Please take immediate measures to reduce the risk.

Shenyu: Cloud input methods with up to one billion users may have leaked input content. Please take immediate measures to reduce the risk.

CointimeCointime2024/04/29 07:37
By:Cointime

Shen Yu stated on social media that the cloud input method used by up to one billion users may have leaked input content. If users have entered mnemonic phrases or other sensitive information using any of the following cloud input methods, immediate action should be taken to reduce the risk.Nine manufacturers, including Baidu, Honor, Huawei, iFlytek, OPPO, Samsung, Tencent, etc., were analyzed to determine if the process of sending user input content to the cloud had security vulnerabilities.The analysis results indicated that eight of the nine manufacturers' input method software contained serious vulnerabilities, which allowed us to completely crack the encryption method designed by the manufacturers to protect user input content. Some manufacturers did not use any encryption method to protect user input content.Based on this study and our previous research on vulnerabilities in Sogou input method, we estimate that up to one billion users may be affected by these vulnerabilities.

0

Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.

PoolX: Earn new token airdrops
Lock your assets and earn 10%+ APR
Lock now!

You may also like