Sure: The Mossad, just like any other such agency, is a powerful beast that can potentially get into any phone today. Let’s assume that’s the case.
But each individual in the Mossad is just a civil worker (or a contractor, see Edward Snowden) with a mediocre salary. At least a subset of these humbly-paid employees can be co-opted with a large sum of money just like a much better paid Swiss bank employee. With bounty phrases they can get rich draining devices with a back door or a known vulnerability without detection! So that “corruptible” subset of agents, even if it’s just one out of a thousand, is enough for the system to work. For the stashing of zero-day exploits to break.
With the implementation of bounty phrase technology, the agency’s ability to hack into a group of devices gets revealed every single time. And if the money is still there, it means they didn’t get into that device group (yet).
i evaluated the options
iPhone - into the sea
Pixel whatever - into the sea
a tinny useless A01 or 10 - into the sea
the massad is renting crack software to the nsa
..what was the name...unicorn?, no...bah, you can look it up, anyway
if you have a phone
and they want in
they get in
it's indecent
i throw stuff in their way because its indecent
you can't make it easy
Sure: The Mossad, just like any other such agency, is a powerful beast that can potentially get into any phone today. Let’s assume that’s the case.
But each individual in the Mossad is just a civil worker (or a contractor, see Edward Snowden) with a mediocre salary. At least a subset of these humbly-paid employees can be co-opted with a large sum of money just like a much better paid Swiss bank employee. With bounty phrases they can get rich draining devices with a back door or a known vulnerability without detection! So that “corruptible” subset of agents, even if it’s just one out of a thousand, is enough for the system to work. For the stashing of zero-day exploits to break.
With the implementation of bounty phrase technology, the agency’s ability to hack into a group of devices gets revealed every single time. And if the money is still there, it means they didn’t get into that device group (yet).
For clarification;
~
The software is called Pegasus.
In version one, you had to click a link in your text to be compromised.
In version 2, the attacker simply enters your phone number to gain root on your phone.
~
https://en.wikipedia.org/wiki/Pegasus_(spyware)
Added note: I hope I stay irrelevant enough for Pegasus 😁
apologies
you are part my of my social graph now
known associate
and i will never be less hunted than i am now - lol
speaking your mind is against the law in the USA
it's not worth it to be a good citizen in a dictatorship
Yeah... To the sea it is 🌊 Don’t need Pegasus on my phone
i am for it
but i am working on an alternative
bounties are awesome
but if government trained killers have told you
that they coming to murder you
and they demonstrated their enthusiasm
by naming your physical location
you just have to put your phones in the sea
for now
Same goes for Chinese citizens that want to be free.
We can beat them, but not with a single method.
If one becomes a target the whole story changes. I agree. Then phone to the sea is a good start.