Backdoors to any mainstream operating systems; iOS, Android, Windows, MacOS with builtin callbacks to databases of all keystrokes logged

Reply to this note

Please Login to reply.

Discussion

They need my hardware 🤷🏽‍♀️ to move my bitty.

They usually confiscate it because we don't expect them to break the door down at 4 AM while we sleep in boxers. Thats how they usually get it. Till this day they haven't used keystrokes to steal someone's bitcoin from their phone it has always been socially engineered.

This will be done in seconds globally masterminded by a US based intelligence agency, blamed on somebody else, some private entity. Just hasnt happened yet.