this post was submitted on 06 Jul 2023
1652 points (98.8% liked)

World News

39005 readers
2155 users here now

A community for discussing events around the World

Rules:

Similarly, if you see posts along these lines, do not engage. Report them, block them, and live a happier life than they do. We see too many slapfights that boil down to "Mom! He's bugging me!" and "I'm not touching you!" Going forward, slapfights will result in removed comments and temp bans to cool off.

We ask that the users report any comment or post that violate the rules, to use critical thinking when reading, posting or commenting. Users that post off-topic spam, advocate violence, have multiple comments or posts removed, weaponize reports or violate the code of conduct will be banned.

All posts and comments will be reviewed on a case-by-case basis. This means that some content that violates the rules may be allowed, while other content that does not violate the rules may be removed. The moderators retain the right to remove any content and ban users.


Lemmy World Partners

News !news@lemmy.world

Politics !politics@lemmy.world

World Politics !globalpolitics@lemmy.world


Recommendations

For Firefox users, there is media bias / propaganda / fact check plugin.

https://addons.mozilla.org/en-US/firefox/addon/media-bias-fact-check/

founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] NewBrainWhoThis@lemmy.world 5 points 1 year ago (3 children)

How would they technically implement this?

[–] Prior_Industry@lemmy.world 3 points 1 year ago (2 children)

I assume it's allowing them the permission to run hacks provided by company's like NSO

[–] MrPoopyButthole@lemmy.world 2 points 1 year ago

Isreal is the biggest seller of hacks

[–] Nalivai@discuss.tchncs.de 1 points 1 year ago (1 children)

But how do those hacks get into your phone? And how do they work actually? I have fairly limited experience with mobile development, but all I know doesn't give me confidence in the idea that you can do shit like that

[–] Prior_Industry@lemmy.world 2 points 1 year ago

Zero-day exploits in apps like WhatsApp and the phones OS. Recieving and reading a message that has malicious code attached can compromised a device. Even iPhones have been vulnerable. These exploits are valuable and temporary though, so get used on high value targets.

This is a good listen: https://darknetdiaries.com/episode/100/