The messaging firm issued a blog post that highlighted multiple suspected flaws in Cellebrite software. This programme requires physical access to a smartphone in order to penetrate its data, and the vulnerabilities were mentioned in the blog post. Signal was able to run its own software on Windows PCs that were being utilised by Cellebrite by taking advantage of vulnerabilities in the code that Cellebrite had written.