Not really, there are a lot of tools in the security space to investigate chips and other low level hardware activity. Lots of companies do that for their own employees. Many government departments of multiple countries also do that. Many of the same tools are also available to "opensource" cyber security folks.

Also, they make so much money with regular users that investing on specialized hardware and running the risk of being found just to get the data from a small number of people that root their devices is way too costly compared to the potential profits from that data.

Reply to this note

Please Login to reply.

Discussion

Then we agree that these potential #vulnerabilities exist, they just haven't been proven yet?

That's why #Snowden also removes the microphones and there are products like NitroPhone with optional removed microphones, sensors and cameras.

It is just important to me that people are aware of this and are not lulled into a false sense of #security.