this post was submitted on 14 Sep 2023
86 points (96.7% liked)
Technology
59357 readers
5222 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Well, that's most terrifying. Can you do anything about it except not using smartphones?
I'm using GrapheneOS for added security and sandboxing, but I feel that this is a bandaid solution.
Thx. You don't seem to be the only one.
https://www.zdnet.com/article/how-to-find-and-remove-spyware-from-your-phone/
Unfortunately, as far as I understand it, not really. NSO and for sure many other companies offering similar spy software use multiple 0-day exploits to get into your device.
At least for the Pegasus one, a system restart seems to do the trick in removing it in most cases, although there are some reports on surviving even a factory reset on some phones…
The other question is, if you are not a person of interest like a high-ranking politician or journalist, you are most likely not going to be a target of an attack. On the other hand, you never know… and that’s the really scary part.
Thanks for the reminder.
article:
wikipedia: pretty much anybody of interests of the people with the ability to acquire the service
Yup, the rabbit hole is quite deep. That’s only the people we know to have been targeted by this version Pegasus, I’m sure the dark figure is much higher.
I would say to just keep your OS and software and such up to date, enable features like Lockdown Mode on iOS if available to you, and just generally have good security practices. Really not much else you can do.
The protocol for how to subvert this type of tracking is all ready known. You have to use burrner phones and swap out every couple of weeks. Don't take any electronics to sensitive meetings.