Has anyone here looked into exactly how exactly the #Pegasus exploit works? Why haven’t their methods been patched yet?

Follow

@liaizon
Someone said they use portable GSM base stations. So sounds like they use GSM modem to exploit.

@brombek so tricking the phone to connect to a fake carrier? But then how are they getting the data back off the phone? Only while they are connected with a GSM spoofer?

@liaizon Yes; Most phones share RAM access with the GSM modem CPU...

Sign in to participate in the conversation
Mastodon 🔐 privacytools.io

Fast, secure and up-to-date instance. PrivacyTools provides knowledge and tools to protect your privacy against global mass surveillance.

Website: privacytools.io
Matrix Chat: chat.privacytools.io
Support us on OpenCollective, many contributions are tax deductible!