• @MonkderVierte@lemmy.ml
    link
    fedilink
    English
    2
    edit-2
    1 month ago

    From a cybersecurity perspective, it is nearly impossible to create a backdoor to a communications product that is only accessible for certain purposes or under certain conditions.

    Oh? It is possible? Pray tell, how?

    • @themurphy@lemmy.ml
      link
      fedilink
      English
      11 month ago

      Screen recording or snapshots like Windows Recall. Or keyboard telemitry.

      But that’s it I think.

      • @Charlxmagne@lemmy.world
        link
        fedilink
        English
        11 month ago

        It’s well known that iphone, google samsung and microsoft android keyboards are the most used keyloggers in the world.