Such assault may be mitigated by periodic verification of security codes. Although, the attacker who was capable of modify the state of the device, could have additionally modified the app itself, making it show the same safety code as the compromised contact has, thus avoiding detection. These two findings #7 and #2 of the report relate to the assaults confirming that two known customers communicate...