0
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
this post was submitted on 01 Jan 0001
0 points (NaN% liked)
0 readers
0 users here now
founded a long while ago
A good example though for iphones is an sma that triggers an exploit that escalates access and allows the entity to install their software that monitors and controls your phone is possible. It even deletes the test. So the end user does not know. It's used and purchased by governments. I'm sure there are 0 days on Android that would do similarly.