<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>signal on bascht.com</title><link>https://bascht.com/tags/signal/</link><description>Recent content in signal on bascht.com</description><generator>Hugo -- gohugo.io</generator><language>de-de</language><lastBuildDate>Wed, 21 Apr 2021 14:06:18 +0000</lastBuildDate><atom:link href="https://bascht.com/tags/signal/index.xml" rel="self" type="application/rss+xml"/><item><title>''Signal >> Blog >> Exploiting vulnerabilities in Cellebrite UFED and Physical Analyzer from an app's perspective</title><link>https://bascht.com/posts/2021/04/21/signal-blog-exploiting-vulnerabilities-in-cellebrite-ufed-and-physical-analyzer-from-an-apps-perspective/</link><pubDate>Wed, 21 Apr 2021 14:06:18 +0000</pubDate><guid>https://bascht.com/posts/2021/04/21/signal-blog-exploiting-vulnerabilities-in-cellebrite-ufed-and-physical-analyzer-from-an-apps-perspective/</guid><description/></item></channel></rss>