• OhVenus_Baby@lemmy.ml
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 hour ago

      How could they load software on the phone? They could use stingray systems possibly or any man in the middle but what if your network traffic is behind a vpn, what if your device is secured. I doubt they can simply CONTROL your device and how it operates from a distance reliably and en mass.

      • TheReanuKeeves@lemmy.world
        link
        fedilink
        English
        arrow-up
        3
        ·
        59 minutes ago

        Zero day backdoors without any interaction from the user are proven possible. Look at Pegasus spyware. The majority of data breaches are due to zero day hacks.