Ontario police secretly deploy phone spyware that captures keystrokes, screenshots, and encrypted messages without user knowledge in major criminal cases.
Depends. Obviously when they say “secret spyware” that means it is, in fact, secret, and we don’t know which spyware they’re using, but as the article notes it could be Paragon Solutions.
They have a system called Graphite, but that primarily targets just instant messaging platforms. If the article is to be believed when it says it could activate your camera, that would signal to me it’s more likely something from NSO Group, like their Pegasus spyware that can also access your camera, GPS coordinates, and more.
All of these are going to be reliant on zero-day exploits, essentially exploits that aren’t known to anyone yet and are still unpatched. All exploits will be a little different, but when it comes to mobile spyware, we usually see them delivered either through texts, websites, or email.
Those attacks can either be someone just receiving the text (even if they don’t click on it, AKA a “zero click” attack), or maybe having to actually go to a particular website with the exploit baked in, or running an attachment from an email.
Joke’s on them, my phone runs GNU/Linux and has hardware kill switches for the mic/camera and for the cellular baseband which I use while at home, instead using Wi-Fi calling
Depends. Obviously when they say “secret spyware” that means it is, in fact, secret, and we don’t know which spyware they’re using, but as the article notes it could be Paragon Solutions.
They have a system called Graphite, but that primarily targets just instant messaging platforms. If the article is to be believed when it says it could activate your camera, that would signal to me it’s more likely something from NSO Group, like their Pegasus spyware that can also access your camera, GPS coordinates, and more.
All of these are going to be reliant on zero-day exploits, essentially exploits that aren’t known to anyone yet and are still unpatched. All exploits will be a little different, but when it comes to mobile spyware, we usually see them delivered either through texts, websites, or email.
Those attacks can either be someone just receiving the text (even if they don’t click on it, AKA a “zero click” attack), or maybe having to actually go to a particular website with the exploit baked in, or running an attachment from an email.
Joke’s on them, my phone runs GNU/Linux and has hardware kill switches for the mic/camera and for the cellular baseband which I use while at home, instead using Wi-Fi calling
What phone does that?
The “my case has a thing on it that covers the camera” phone? Idk about the mic tho
I’d assume the Pinephone (Pro).
Or purism… if they still exist or ever shippef a phone. Havent followed them in a while
I dunno, in the states they have the ‘secret service’ but I can definitely see them. Something tells me ‘secret’ things aren’t so secret…