🎥FRESH TALK DROP: Your phone, the spy.

In the fight against spyware like Pegasus, your phone is the frontline.

Last week at the Oslo Freedom Forum https://blossom.primal.net/4dc930b72c717f0123891cb0195a1a86086baab8ebfdccbf8b78b1b5316a9551.mp4

Topics:

❌The dictators repression toolkit

❌How mercenary spyware is used to spread fear around the globe

❌Zero click vs 1 click attacks

❌What works in the fight to pump the brakes on spyware proliferation

BONUS:

✅What you can do right now to make yourself harder to hack

Full talk:

https://youtu.be/qknOIafYODs?t=63

Reply to this note

Please Login to reply.

Discussion

We need this

We need this

🔥🔥

Top 💪🔥🔥🔥

We need peer2peer devices, like #cybiko.

The is a #cybiko peer2peer device.

It works with #nostr ? 😅

It's funny, i was thinking about that use a little more earlier.

nostr:nevent1qvzqqqqqqypzqvhpsfmr23gwhv795lgjc8uw0v44z3pe4sg2vlh08k0an3wx3cj9qqszteter497v9aqywewa3d4nm804sdcmawd64gp8amu5h9tp6hxmdgscqhvv

keep up the good work!

If you need a phone, but want to prevent that nonsense, GrapheneOS is your best bet.

Also, if you're in America, use an MVNO instead of something like Verizon, T-Mobile or AT&T.

I think there's a lot of value in using a more security & privacy focused OS like #GrapheneOS. For those not interested in going that far, Lockdown Mode on iOS (& Advanced Protection Mode coming soon in Android 16) both look like interesting choices to raise the cost-to-hack.

That said, I'm not sure that any operating system is going to totally prevent this category of attack.

What Pegasus does (from what I've heard) is essentially some sort of buffer overflow attack.

Graphene prevents Pegasus infection, as its developers already know how the spyware works.

We are sure that #GrapheneOS from install has protection far above what these settings can offer, although ultra-high risk individuals should also be moving towards changing their behaviour and how they go about with using the Internet. It should apply even if they aren't using GrapheneOS.

A lot of effort is done to try and make sure such exploitation needs to be a bespoke solution designed towards GrapheneOS. Most Android distributions do not harden anything nor substitute components with security-focused replacements, so they carry almost all of the vulnerability weight of the upstream. We do carry a smaller part of it and both carry weight of upstream projects like the Linux kernel which needs to be replaced in the far future.

If it did happen we'd hopefully know the scale and effectiveness would be leagues below what's happening elsewhere. GrapheneOS gets updates, new security/privacy features, kernel patching and more almost on a weekly basis and that can (un-)intentionally stop an old exploit working.

There would also be a lot to discuss regarding AppSec for messaging apps used as exploitation vectors, but this would be better at different place. A lot of messengers with great privacy and huge userbases have room for improvement for security enhancements, Signal being one.

Pegasus was first discovered in 2016. Almost 10 years ago.

Surely by now the surveillance tech has outgrown our knowledge about it?

Yep, me & my colleague cowrote that paper 😉

You're right, the tech has gotten smarter. The 2016 cases for example were 1-click attacks. More recently we've seen most of the players doing 0-click attacks. Which makes sense if you've got the resources for it.

And Paragon, for example, is a more sophisticated animal. Despite this, we continue actively tracking mercenary spyware including Pegasus. And Paragon's Graphite and some others..

Love your work!!💥

We need you!

Stay safe yourself 💪🏼

Credit to our team, collaborators & the victims that bravely come forwards to share the truth.

⚖️’s that are used that involve cell data outside written laws of each country- $ and politics. Individual human believing a threat exists and coding that is spyware. Gist.

nostr:nevent1qqsqrutfj47wevjaf7wp3rwn0kz0j3dcpnckxc28rce9kyds0tqlrwqpzemhxue69uhhyetvv9ujuurjd9kkzmpwdejhg0eupl7