You are viewing a single thread.
View all comments 28 points
*
From a cybersecurity perspective, it is nearly impossible to create a backdoor to a communications product that is only accessible for certain purposes or under certain conditions.
Oh? It is possible? Pray tell, how?
9 points
Screen recording or snapshots like Windows Recall. Or keyboard telemitry.
But that’s it I think.
12 points
It’s well known that iphone, google samsung and microsoft android keyboards are the most used keyloggers in the world.
0 points
7 points