Has anyone here looked into exactly how exactly the #Pegasus exploit works? Why haven’t their methods been patched yet?
@liaizonSomeone said they use portable GSM base stations. So sounds like they use GSM modem to exploit.
@brombek so tricking the phone to connect to a fake carrier? But then how are they getting the data back off the phone? Only while they are connected with a GSM spoofer?
@liaizon Yes; Most phones share RAM access with the GSM modem CPU...
Fast, secure and up-to-date instance. PrivacyTools provides knowledge and tools to protect your privacy against global mass surveillance. Website: privacytools.io Matrix Chat: chat.privacytools.io Support us on OpenCollective, many contributions are tax deductible!
@brombek so tricking the phone to connect to a fake carrier? But then how are they getting the data back off the phone? Only while they are connected with a GSM spoofer?