Settings

Theme

Surveillance campaigns use commercial tools exploit long-known vulnerabilities

cyberscoop.com

4 points by lschueller 8 days ago · 1 comment

Reader

lashull 8 days ago

> "The reality is that there are a number of known surveillance vendors and bad actors in this space, but given the opaque nature of telecommunications signalling protocols, those vendors are able to operate without revealing exactly who they really are"

This pretty much summarizes the core problem of the whole mobile security field. You can only secure as far, as the next closed ecosystem is away. Which is not very far. Caused by the ongoing push & pull between the key players.

Keyboard Shortcuts

j
Next item
k
Previous item
o / Enter
Open selected item
?
Show this help
Esc
Close modal / clear selection