• OhVenus_Baby@lemmy.ml
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 hour ago

        How could they load software on the phone? They could use stingray systems possibly or any man in the middle but what if your network traffic is behind a vpn, what if your device is secured. I doubt they can simply CONTROL your device and how it operates from a distance reliably and en mass.

        • TheReanuKeeves@lemmy.world
          link
          fedilink
          English
          arrow-up
          3
          ·
          59 minutes ago

          Zero day backdoors without any interaction from the user are proven possible. Look at Pegasus spyware. The majority of data breaches are due to zero day hacks.