But how do those hacks get into your phone? And how do they work actually? I have fairly limited experience with mobile development, but all I know doesn’t give me confidence in the idea that you can do shit like that
Zero-day exploits in apps like WhatsApp and the phones OS. Recieving and reading a message that has malicious code attached can compromised a device. Even iPhones have been vulnerable. These exploits are valuable and temporary though, so get used on high value targets.
How would they technically implement this?
I assume it’s allowing them the permission to run hacks provided by company’s like NSO
Isreal is the biggest seller of hacks
But how do those hacks get into your phone? And how do they work actually? I have fairly limited experience with mobile development, but all I know doesn’t give me confidence in the idea that you can do shit like that
Zero-day exploits in apps like WhatsApp and the phones OS. Recieving and reading a message that has malicious code attached can compromised a device. Even iPhones have been vulnerable. These exploits are valuable and temporary though, so get used on high value targets.
This is a good listen: https://darknetdiaries.com/episode/100/
deleted by creator
deleted by creator