• OhVenus_Baby@lemmy.ml
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 hour ago

    How could they load software on the phone? They could use stingray systems possibly or any man in the middle but what if your network traffic is behind a vpn, what if your device is secured. I doubt they can simply CONTROL your device and how it operates from a distance reliably and en mass.

    • TheReanuKeeves@lemmy.world
      link
      fedilink
      English
      arrow-up
      3
      ·
      59 minutes ago

      Zero day backdoors without any interaction from the user are proven possible. Look at Pegasus spyware. The majority of data breaches are due to zero day hacks.