What’s the context here?

Reply to this note

Please Login to reply.

Discussion

I think its malware masquerading as a game and using Bluetooth to exfiltrate data

Where’s the source to find out more about it?

Or am I just misunderstanding, and this is not an exploit that has actually happened but a theoretical one?

Seems theoretical. But if there are casual musings in notes, then this avenue has likely been explored and exploited if possible

My friend was getting fucked with by a malicious network via game center but we didn't undetstand what was happening. False window/ fake screen share to try and log or see passwords.

nostr:nevent1qqsrnsmgd97943qll09ce0vkkchjsa0jjpvnr55rd92vv9syfr97uzgpz3mhxw309ucnydewxqhrqt338g6rsd3e9upzpmd5wqn399avtfslyalne52du4xx066ue5sw7rva72d7rp59hvqyqvzqqqqqqydv5xkq

Yikes! What’s the best defense against this? This should be posted on Hacker News.

SOLUTION TO ALL PHONE HACKING ISSUES, PROGRAMMING AND ONLINE TRAINING

* Email: conleyjbeespy606@gmail.com

* Telegram : +44 7456 058620

* Instagram: JBEE SPY TEAM

CERTIFIED ONLINE PRIVATE INVESTIGATOR AND CYBER SOLUTION EXPERT

- Full access hack into all types of mobile phones/devices

* Unnoticeable hack into all social media account

* Fixing of credit score

* Fixing of public record

* Recovery and multiplying of BITCOIN

* Cloud and email data extraction