0
()
submitted a long while ago by @ to c/@
you are viewing a single comment's thread
view the rest of the comments
[-] seang96@spgrn.com 1 points 1 year ago

A good example though for iphones is an sma that triggers an exploit that escalates access and allows the entity to install their software that monitors and controls your phone is possible. It even deletes the test. So the end user does not know. It's used and purchased by governments. I'm sure there are 0 days on Android that would do similarly.

this post was submitted on 01 Jan 0001
0 points (NaN% liked)

0 readers
0 users here now

founded a long while ago