• BeBopALouie@lemmy.ca
    link
    fedilink
    English
    arrow-up
    3
    ·
    3 hours ago

    If you turn your phone off when being pulled over would it make any difference or does the spyware still do its thing?

  • Archangel1313@lemmy.ca
    link
    fedilink
    English
    arrow-up
    7
    ·
    4 hours ago

    Good luck making that stand up in court. They may as well be handing out “get-out-of-jail-free” cards.

    • TheReanuKeeves@lemmy.world
      link
      fedilink
      English
      arrow-up
      9
      ·
      4 hours ago

      They don’t use it as admissible evidence, they use it to find out whether someone is worth pursuing in legitimate ways that are more time and effort intensive.

      • Archangel1313@lemmy.ca
        link
        fedilink
        English
        arrow-up
        2
        arrow-down
        1
        ·
        3 hours ago

        That type of investigation would still require a warrant or exigent circumstances at the minimum. Otherwise it’s just fishing…which is a violation of Canada’s privacy laws. They can’t just go rooting through someone’s phone looking for a reason to pursue further investigation.

          • Archangel1313@lemmy.ca
            link
            fedilink
            English
            arrow-up
            1
            ·
            2 hours ago

            Aah. I missed this part on my first reading…

            Once a judge approves surveillance, police have carte blanche on methods.

            This would be used on suspects that they have a warrant to investigate.

    • AmbitiousProcess (they/them)@piefed.social
      link
      fedilink
      English
      arrow-up
      12
      ·
      6 hours ago

      Depends. Obviously when they say “secret spyware” that means it is, in fact, secret, and we don’t know which spyware they’re using, but as the article notes it could be Paragon Solutions.

      They have a system called Graphite, but that primarily targets just instant messaging platforms. If the article is to be believed when it says it could activate your camera, that would signal to me it’s more likely something from NSO Group, like their Pegasus spyware that can also access your camera, GPS coordinates, and more.

      All of these are going to be reliant on zero-day exploits, essentially exploits that aren’t known to anyone yet and are still unpatched. All exploits will be a little different, but when it comes to mobile spyware, we usually see them delivered either through texts, websites, or email.

      Those attacks can either be someone just receiving the text (even if they don’t click on it, AKA a “zero click” attack), or maybe having to actually go to a particular website with the exploit baked in, or running an attachment from an email.

      • OhVenus_Baby@lemmy.ml
        link
        fedilink
        English
        arrow-up
        2
        arrow-down
        1
        ·
        4 hours ago

        How could they load software on the phone? They could use stingray systems possibly or any man in the middle but what if your network traffic is behind a vpn, what if your device is secured. I doubt they can simply CONTROL your device and how it operates from a distance reliably and en mass.

        • TheReanuKeeves@lemmy.world
          link
          fedilink
          English
          arrow-up
          4
          ·
          4 hours ago

          Zero day backdoors without any interaction from the user are proven possible. Look at Pegasus spyware. The majority of data breaches are due to zero day hacks.