That’s the only way I’ve seen it done prior. The unknown questions with bigger ramifications are:

- Backdoors

- Internal corporate spy/informant

- Targeted device exploitation/exfiltration

- Cryptography failures

- Something something synced cloud storage

Reply to this note

Please Login to reply.

Discussion

💯

Ah, after reading it seems it was pulled from his phone itself. I wonder if it was only recent chats or if there are still breadcrumbs yielding information.