**tl;dr** WhatsApp stored TLS session resumption files on the sdcard where a malicious application or some social engineering attacker could read.
**tl;dr** Uses a known docker breakout to escape into the wrapping VM, then by replacing a logfile with a symlink you could post to locations on the host machine.
Just an overview of how opening links is broken if you don’t check the schema and let the OS deal with it.