Earlier today I needed to get into an Instagram account. The owner went to the login screen and clicked the "Get link to login" button and promptly received an email with the special link.<p>This link was copy/pasted into a Signal chat with me, and instantly another email arrived "New login to your account: WhatsApp Spider <Nearby City>".<p>Nearby to the sender the is. Is the prefetch showing up as WhatsApp? If so, why?
Interesting. I entered a URL into Signal in 'note to self' (didn't send) and in my access log I saw<p><pre><code> 162.210.7.8 - - [20/Jul/2022:16:40:18 -0500] "GET / HTTP/1.1" 200 15336 "-" "WhatsApp/2"
</code></pre>
of course, anyone can send any user agent they like. Maybe signal is doing this for better compatibility. I did a quick search in the open source of signal-android and found this: <a href="https://github.com/signalapp/Signal-Android/blob/e22ddb8f96f8801f0abe622b5261abc6cb396d94/app/src/main/java/org/thoughtcrime/securesms/linkpreview/LinkPreviewRepository.java#L82" rel="nofollow">https://github.com/signalapp/Signal-Android/blob/e22ddb8f96f...</a><p><pre><code> public LinkPreviewRepository() {
this.client = new OkHttpClient.Builder()
.cache(null)
.addInterceptor(new UserAgentInterceptor("WhatsApp/2"))
.build();
}
</code></pre>
so yes the client app generates a preview of an entered URL by making requests with the user agent WhatsApp/2.