• OhVenus_Baby@lemmy.ml
      link
      fedilink
      English
      arrow-up
      2
      arrow-down
      1
      ·
      4 hours ago

      How could they load software on the phone? They could use stingray systems possibly or any man in the middle but what if your network traffic is behind a vpn, what if your device is secured. I doubt they can simply CONTROL your device and how it operates from a distance reliably and en mass.

      • TheReanuKeeves@lemmy.world
        link
        fedilink
        English
        arrow-up
        4
        ·
        4 hours ago

        Zero day backdoors without any interaction from the user are proven possible. Look at Pegasus spyware. The majority of data breaches are due to zero day hacks.