Does anyone know how this even works? Is the technology for this already in place?

    • Hyperreality@kbin.social
      link
      fedilink
      arrow-up
      5
      ·
      1 year ago

      Snowden.

      A good starting point is here:

      https://en.wikipedia.org/wiki/ANT_catalog

      For example:

      DROPOUTJEEP … “A software implant for the Apple iPhone that utilizes modular mission applications to provide specific SIGINT functionality. This functionality includes the ability to remotely push/pull files from the device. SMS retrieval, contact list retrieval, voicemail, geolocation, hot mic, camera capture, cell tower location, etc. Command, control and data exfiltration can occur over SMS messaging or a GPRS data connection. All communications with the implant will be covert and encrypted.”

      And here:

      https://en.wikipedia.org/wiki/Global_surveillance_disclosures_(2013%E2%80%93present)

    • Minsk_trust@lemmy.world
      link
      fedilink
      English
      arrow-up
      3
      ·
      1 year ago

      The NSA had a program called DROPOUTJEEP according to an article in Der Spiegel. Think it came out with Snowden? Fuzy on details but you can look into it. It did include camera access but i dont think it could be installed remotely. Id be surprised if theres anything the NSA cant intercept but thats obviously what they would want us to think and Im just a guy.

      • markstos@lemmy.world
        link
        fedilink
        English
        arrow-up
        4
        ·
        1 year ago

        There will always be spies working with exploits, which is different from a sanctioned backdoor.

        I doubt the tech used in DROPOUTJEEP works anymore.