Problems continue for users of Google Pixel phone models. A group of experts has found that the screenshot editing functionality is unreliable. The app used to edit this type of file does not completely hide the content it generates, so hackers are able to recover this information.
Screenshots are a resource that is used more every day in all types of chats, as it is a great tool to provide context or transfer information that we cannot copy directly.
Read also Begoña Gómez Urzaiz
This is a fairly serious vulnerability because every day it is more common for users to crop or blur sensitive information in images that are shared. An example of this danger occurs when someone sends or shares a ticket to an event or a screenshot of their bank account application on social networks. Before doing so, the user will crop the part of the image where compromising data appears. Now, with Google Pixel, a computer expert is capable of recovering that data that supposedly should be hidden.
‘Acropalypse’ is capable of recovering hidden information
This privacy violation suffered by Google Pixel users has received the name ‘Acropalypse’, which has become an application that allows these cut-out pieces of photos edited on Google mobile terminals to be recovered.
The discoverers of this serious security flaw have already created a website with which to restore the edited parts of a screenshot.
As it is a bug that can be resolved without touching the main software of the phone, the solution from Google should arrive in the coming weeks.
After a few weeks ago it was discovered that a YouTube video is capable of causing a restart on some devices, now Google Pixel suffers another blow to its reputation. In addition, this is especially hard as it is a terminal focused on photography.
Amazon
Windows 11 suffers from the same vulnerability
Google is not the only manufacturer with this problem, as the Windows 11 Snipping Tool application suffers from the exact same problem.
The Windows 11 Snipping Tool does not completely remove the original information from the file, but instead leaves it appended to the end in a way that is normally not visible to users. Now, a potential attacker can recover the hidden information in the file.
Also read Alex Suárez Font