- cross-posted to:
- hackernews@derp.foo
- technews@radiation.party
- cross-posted to:
- hackernews@derp.foo
- technews@radiation.party
Pegasus is a highly sophisticated and controversial spyware tool developed by the Israeli cybersecurity firm NSO Group. Pegasus is designed to infiltrate and infect mobile devices, including smartphones, and it allows the attacker to remotely monitor and collect a wide range of information from the compromised device. This information can include text messages, call logs, emails, GPS location data, and more. It can also be used to activate the device’s microphone and camera for audio and video surveillance.
Well, that’s most terrifying. Can you do anything about it except not using smartphones?
I’m using GrapheneOS for added security and sandboxing, but I feel that this is a bandaid solution.
Thx. You don’t seem to be the only one.
https://www.zdnet.com/article/how-to-find-and-remove-spyware-from-your-phone/
Unfortunately, as far as I understand it, not really. NSO and for sure many other companies offering similar spy software use multiple 0-day exploits to get into your device.
At least for the Pegasus one, a system restart seems to do the trick in removing it in most cases, although there are some reports on surviving even a factory reset on some phones…
The other question is, if you are not a person of interest like a high-ranking politician or journalist, you are most likely not going to be a target of an attack. On the other hand, you never know… and that’s the really scary part.
Thanks for the reminder.
article:
wikipedia: pretty much anybody of interests of the people with the ability to acquire the service
Yup, the rabbit hole is quite deep. That’s only the people we know to have been targeted by this version Pegasus, I’m sure the dark figure is much higher.
The protocol for how to subvert this type of tracking is all ready known. You have to use burrner phones and swap out every couple of weeks. Don’t take any electronics to sensitive meetings.
I would say to just keep your OS and software and such up to date, enable features like Lockdown Mode on iOS if available to you, and just generally have good security practices. Really not much else you can do.