What is Pegasus, and How Does it Spy on You?

Поділитися
Вставка
  • Опубліковано 15 чер 2024
  • The Guardian newspaper has highlighted the perils of government sanctioned cyber-surveillance, following its exposé of Pegasus, a sophisticated piece of malware that is being used by authoritarian regimes to target activists, politicians, and journalists. So, what is Pegasus? How does it work? Can you protect yourself? Let's find out.
    Introduction to Android app development: www.dgitacademy.com
    Let Me Explain T-shirt: teespring.com/gary-explains-l...
    Twitter: / garyexplains
    Instagram: / garyexplains
    #garyexplains

КОМЕНТАРІ • 1,3 тис.

  • @sohamray2266
    @sohamray2266 2 роки тому +498

    Funny how many illegal things can be made legal so easily by these companies and Governments just by putting "Crime" & "terrorism" in the sentence. Fighting crimes by doing crime is the norm now eh?

    • @ulysse21
      @ulysse21 2 роки тому +19

      Basically, since war was invented

    • @crazydog3307
      @crazydog3307 2 роки тому +11

      this, honor has been a myth for years, perhaps forever lol

    • @ladymuck2
      @ladymuck2 2 роки тому +3

      And fighting germs.

    • @earthstick
      @earthstick 2 роки тому +27

      Terrorism is pretext to spying. If there are no terrorists, they will make some, so they can spy.

    • @NeonfOxa
      @NeonfOxa 2 роки тому +6

      Now? lol just open up any history book, and you learn very quick that the only thing that's different now is the technology

  • @jimmypatrick4409
    @jimmypatrick4409 2 роки тому +218

    We really need phones with hard switch, which disconnects camera and microphone. Phone's usually don't even have indicator when microphone and camera are in use. (although new version of android and ios has indication on screen, which i bet can be bypassed with another zero day in future)

    • @chiranjeevsahoo4960
      @chiranjeevsahoo4960 2 роки тому +33

      There's a phone called librem and pinephone. It runs linux but the software support is far from better. Ofcourse it will open a whole new box of vulnerabilities but atleast it has hard switches. We seriously need to support these developers (by buying the phone or just donating to them). So that the development process will be accelerated and we will get a serious competitor to android or ios

    • @An.Individual
      @An.Individual 2 роки тому +13

      Duct Tape

    • @autohmae
      @autohmae 2 роки тому +7

      Try removing your battery, most smartphones that's already hard to do !

    • @autohmae
      @autohmae 2 роки тому +8

      @@chiranjeevsahoo4960 I've bought Fairphone, which has removable battery at least.

    • @FreezeFun
      @FreezeFun 2 роки тому +10

      Agreed. Apple could've replaced the mute switch for a hard switch and any Android OEM can add it.

  • @eljuano28
    @eljuano28 2 роки тому +325

    Just because we're paranoid, doesn't mean they're not out to get us.

    • @udaynarayanmukherjee5208
      @udaynarayanmukherjee5208 2 роки тому +14

      he got us more paraniod now

    • @Ynze_207
      @Ynze_207 2 роки тому +15

      Gotta find a way, a better way.
      Makes me sick how silently this is all happening.

    • @Anon1370
      @Anon1370 2 роки тому +2

      you mean to tell me ive been putting on a random show for free shit i need to start charging ;/

    • @mniles
      @mniles 2 роки тому +4

      what im scared of is some random guy getting access to my phone. government has no need to monitor me, and even if they do, they arent gonna do anything to directly hurt me. i dont want some random dude in a basement to see im doing something and blackmail me with it. maybe i shouldnt have watched black mirror lol

    • @vincenta1886
      @vincenta1886 2 роки тому +1

      nice try FBI

  • @charlespratt8663
    @charlespratt8663 2 роки тому +195

    Nothing electronic is secure. I even have doubts about my toaster and I unplug it when not in use.

    • @Artoooooor
      @Artoooooor 2 роки тому +14

      Not hackable but can catch fire. Because they don't embed any CPU into toaster... do they?

    • @ashiksaleem360
      @ashiksaleem360 2 роки тому +5

      @@Artoooooor you neve kno.. their are toasters specially designed

    • @JanJeronimus
      @JanJeronimus 2 роки тому +7

      @@Artoooooor If you have a smart toaster and on regular basis toast bread you can get a problem. If you do no toast you are probably away, Perhaps nobody is at home so if someone comes to your home he can steal things more easy.😉

    • @ov3rkill
      @ov3rkill 2 роки тому +3

      It's only a matter of time before that toaster attacks you.

    • @MrBawdry
      @MrBawdry 2 роки тому +4

      Aah so you're a waffle man!

  • @onceagain77
    @onceagain77 2 роки тому +187

    8:07 I like how our "hacker" is "typing" and the screen says press any key to continue.

    • @amos_bebeh
      @amos_bebeh 2 роки тому +11

      Sharp eye ma man 😂

    • @MegasXLR
      @MegasXLR 2 роки тому +1

      yea lol

    • @kodaph
      @kodaph 2 роки тому +3

      Eagle's Eyes...

    • @autohmae
      @autohmae 2 роки тому +4

      That's very normal in such videos, someone just puts in a different, static, screen.

    • @onceagain77
      @onceagain77 2 роки тому

      @@autohmae Yea its just a funny continuity error.

  • @tav6459
    @tav6459 2 роки тому +19

    I work as an Advanced SOC analyst and this is the best explanation that I’ve heard.

    • @GaryExplains
      @GaryExplains  2 роки тому +1

      Wow, thanks!

    • @_justarandomone_8884
      @_justarandomone_8884 2 роки тому +2

      What do an advanced SOC analyst do?

    • @tav6459
      @tav6459 2 роки тому +6

      @@_justarandomone_8884 well In short, we use a set of tool to investigate everything on the company network, then we build rules to alert us when malicious activity is happening and more. When we find strange or weirds things that we suspect we start investigate every piece that we can, if its a malware we need to understand what it does and how to react.
      If its a breach we need to find from where and who and block that.
      In short lol.

  • @CrucesNomad1
    @CrucesNomad1 2 роки тому +37

    These exploits being used are not accidents, that is the real crime. Your encryption required by the govt has flaws they use against you also.

  • @pepe-fy5kw
    @pepe-fy5kw 2 роки тому +107

    The dystopian future is now.

  • @myongpark
    @myongpark 2 роки тому +24

    5:10. Gary explains zero day bugs and a fly zooms by in front of his face. Well played Sir.

  • @Mozenator
    @Mozenator 2 роки тому +11

    In the early days of your channel, I challenged the accuracy of an argument you made with ignorant, adolescent, hubris in the comment section. You responded with clarifying information and honest questioning into my concerns.
    While I'm by no means advocating for the increase of your interactions with the unwashed masses, I've been subscribed for years now and wanted express my gratitude. Not only for what you do, but for how you do it. Earnest authenticity is, unfortunately, a rare commodity in this world.

  • @sbrazenor2
    @sbrazenor2 2 роки тому +115

    The government would never misuse its power and authority to abuse its citizens... 🤣 I couldn't even write that with a serious expression on my face.

    • @ea168
      @ea168 2 роки тому

      Corruption

    • @sbrazenor2
      @sbrazenor2 2 роки тому

      @@ea168 that was the joke. I was being sarcastic.

    • @ea168
      @ea168 2 роки тому +1

      @@sbrazenor2 i know that lol, corrupted worker inside a government who has access to that type power is a problem, my sibling was a victim

  • @taleg1
    @taleg1 2 роки тому +16

    I find it sad that a symbol who represent freedom like the pegasus is used to curtail freedoms, it shows how much things are twisted and wrong with the world today.

  • @Hfil66
    @Hfil66 2 роки тому +12

    It is not just about iOS or Android. Even SIMs have processors in them, albeit not as sophisticated as the ones running your smart-phone, but the SIMs themselves can be infected. Then you have issues with the SS7 protocol that can have your phone hijacked at the network level.

    • @themohmand
      @themohmand Рік тому +2

      That's interesting. I wonder how it works with eSIMs since they are only software based

  • @psillypseudonym1278
    @psillypseudonym1278 2 роки тому +66

    This is almost like the bit in the Dark Knight where Lucius Fox turns every mobile device in Gotham City into one big sonar device to find Joker.

    • @namelesske
      @namelesske 2 роки тому +1

      @Ryan's Random Videos Every government is a hero in his own eyes. Just like a good villain.

    • @fellowcitizen
      @fellowcitizen 2 роки тому +1

      Except in the hands of Evil and illegitimate crime syndicates in control of political parties and bureaucracy

    • @0xC47P1C3
      @0xC47P1C3 2 роки тому +2

      Look up WiFi Doppler imaging

  • @KouroshFarrokhzad
    @KouroshFarrokhzad 2 роки тому +2

    Excellent and very clear explanation of complex infomration here Gary, thanks so much for such an illuminating and useful piece.

  • @bibasik7
    @bibasik7 2 роки тому +74

    Damn, that’s crazy!
    _downloads suspicious mirror of Angry Birds on iOS 6_

  • @sh-bm3is
    @sh-bm3is 2 роки тому +18

    India is one of the countries named in the report and the targets are indeed activists , and numerous journalists working for national newspapers and a few politicians as well.

  • @aakashjana6225
    @aakashjana6225 2 роки тому +22

    So basically when they showed in Fast and Furious 8 that the lady could monitor or use any device remotely they weren't totally making stuff up.

    • @jibraniqbal7830
      @jibraniqbal7830 2 роки тому +13

      it is okay, as it was for the FAMILY. :)

    • @surlyogre1476
      @surlyogre1476 2 роки тому +2

      I hadn't seen that movie, but, *yes* .

    • @lewisjones4158
      @lewisjones4158 2 роки тому

      Remote monitoring has been around for like 25 years. F&F8 is from 2017 lol

  • @firdousbhat123
    @firdousbhat123 2 роки тому +4

    Thank you, Gary. That was so informative.

  • @EsaMononen
    @EsaMononen 2 роки тому +7

    05:07 fly passes by when talking about bugs

  • @thaernejem7317
    @thaernejem7317 2 роки тому +41

    I can name at least a few of governments who do this as a life style!

    • @kishanchauhan2790
      @kishanchauhan2790 2 роки тому +1

      Name it then.

    • @ineffa8le00rt
      @ineffa8le00rt 2 роки тому +16

      Literally Israel

    • @someoneyouneverknow7529
      @someoneyouneverknow7529 2 роки тому +15

      @@ineffa8le00rt expected from illegal country

    • @ut100c
      @ut100c 2 роки тому +3

      Over the weekend, an international consortium of news outlets reported that several authoritarian governments - including Mexico, Morocco and the United Arab Emirates - used spyware developed by NSO Group to hack into the phones of thousands of their most vocal critics, including journalists, activists, politicians and business executives.
      Lol not my words just copied from TechCrunch

    • @someoneyouneverknow7529
      @someoneyouneverknow7529 2 роки тому +5

      @@ut100c reminds me of Jamal Kashoggi's assassination by Arab's royal family, disgusting af

  • @eulehund99
    @eulehund99 2 роки тому +9

    You could also get a phone where you can disconnect the camera, microphone, wifi module and GPS module from the circuit, turning them off completely.

  • @rahuljayachandran4128
    @rahuljayachandran4128 2 роки тому

    Thank you so much for this upload😍🙂takecare and stay safe Gary🙂

  • @jbuchan12
    @jbuchan12 2 роки тому +1

    Thanks for doing this Gary, this is very important...

  • @10100rsn
    @10100rsn 2 роки тому +18

    5:06 or a bug that you know about because it flies in front of your face while you're talking about technical bugs ???

    • @asoftraiden
      @asoftraiden 2 роки тому +1

      Damn 🤣🤣🤣🤣🤣🤣🤣🤣🤣🤣🤣🤣🤣

  • @leguirerj
    @leguirerj 2 роки тому +19

    I just turn off my phone. Guess can't guarantee the phone is really off. I'll just take out my battery. Oops!, can't remove batteries any more.

    • @archygrey9093
      @archygrey9093 2 роки тому +5

      The Samsung Galaxy XCover 5 and XCover Pro have removable batteries (no tools required) AND headphone jacks.
      Also rugged and waterproof, with guaranteed security updates for the next 5 years. Worth checking out if you need a new phone.
      Can also buy tablet versions too.
      Its funny because because now having a removable battery is considered a feature in a phone.

  • @RbNetEngr
    @RbNetEngr 2 роки тому +1

    Good explanation about malware, and Pegasus. Thanks!

  • @cxplorerv3
    @cxplorerv3 2 роки тому +1

    Very informative video! Scary but at least your giving us tips on how to deal with those stuff. Thank you from Canada. :)

    • @rexluminus9867
      @rexluminus9867 2 роки тому +1

      Battery out but condenser is still inside? Try to make an emergency call without the battery in.If you can't than it's in your advantage.
      🇭🇺🇨🇦

  • @KemalPH
    @KemalPH 2 роки тому +7

    When Gary releases video about a hot topic, usually it’s all I need to know about it

  • @diogocosta2832
    @diogocosta2832 2 роки тому +12

    Unfortunately in the future this problem will only get worst. Thanks for the information Gary.

  • @pkrook71
    @pkrook71 2 роки тому +1

    Thanks for another great video. Regarding your advice to always update to the latest version of your OS. Do you think that goes for the first version of a major new release as well? Like the upcoming iOS 15, for example. Apple has a tendency to release a first update fairly soon after a major release to fix the most severe bugs etc. Do you think that I, strictly from a security perspective, should install the major new release immediately, or wait for the first update? Do major new releases suffer enough bugs to tip the scales?

  • @markbrown8039
    @markbrown8039 2 роки тому

    A superb and much appreciated explaination, Thanks!

  • @hassanawodi5888
    @hassanawodi5888 2 роки тому +4

    This is about the best advice. There is no such thing as complete privacy with digital technologies. If you are paranoid, ditch mobile phone.

  • @MadMaxBLD
    @MadMaxBLD 2 роки тому +6

    Doing God's work, Gary. Thanks for the explainer, very informative!

  • @Root__314
    @Root__314 2 роки тому +2

    You are being watched.
    Actually, one of the ways to stop stuff like this is to cut out its means to communicate. It can still record, or log, but if there's a way to prevent it from communicating, then they'll not succeed.
    On a different note, thanks for the including the POI clip. It's my favorite series of all time.

  • @helge000
    @helge000 2 роки тому

    Thanks for making this video Gary!

  • @davidespingel1223
    @davidespingel1223 2 роки тому +16

    Why worry about Pegasus when people openly invite Amazon, Alexa and own IPhones and give out private info to social media sites.

  • @jalabi99
    @jalabi99 2 роки тому +10

    Joke's on them, my phone is two tin cans with a length of string

    • @MASAo7
      @MASAo7 2 роки тому +2

      You just described how my phone's internet feels.

    • @rexluminus9867
      @rexluminus9867 2 роки тому +2

      Hahaha! There's away to tap onto that!!! I have done it around age 7. It's funny it really works.

  • @Dreyzie
    @Dreyzie 2 роки тому +1

    I respect your works young man. Wish you more years of hardware exploration 💯💗

  • @lowpowerlarry9957
    @lowpowerlarry9957 2 роки тому

    I loved the video Gary. A bit of tape will prevent the camera from working. Reminds me of the days when I used a Motorola "brick" phone. BTW, I really like the music that started at around 41 seconds into the video, what is it?

  • @davel4030
    @davel4030 2 роки тому +9

    That "hacker" sure was typing slowly. Lol

    • @davidt01
      @davidt01 2 роки тому

      So you have to be typing fast if you're a hacker?

  • @michaelcutler7481
    @michaelcutler7481 2 роки тому +12

    Just realised that your background image is the CBD of Singapore. :)

  • @mmp0084
    @mmp0084 2 роки тому +1

    Very well explained sir . Thanks !

  • @efeegbevwie9467
    @efeegbevwie9467 2 роки тому

    Very informative Gary, it'll be helpful if you link any video on your channel that's related to the subject of the current video.

  • @1MarkKeller
    @1MarkKeller 2 роки тому +5

    *GARY!!!*
    *Good Afternoon Professor!*
    *Good Afternoon Fellow Classmates!*
    Stay safe out there everyone!

  • @gu1tarman233
    @gu1tarman233 2 роки тому +3

    Edward Snowden also said, 6 or 7 years ago, that we could ALREADY be surveilled through our phones (possibly just iphones then?). He seemed to know this through working for a contractor for the NSA.

    • @iamshango3005
      @iamshango3005 Рік тому

      And they say this is heaven 🤣🤣🤣🤣🤣🤣🤣

  • @Highway010.
    @Highway010. 2 роки тому +2

    Very interesting, thanks for the info!

  • @SDATech
    @SDATech 2 роки тому

    Very good informative & explanatory video...
    Loved it

  • @Quarky_
    @Quarky_ 2 роки тому +6

    Great coverage Gary. I can't wait until Linux phones are usable. Phones with a fully open source stack are the only chance we have got against this (short of using a feature phone, or no phone at all :-P). I have a PinePhone, it has some pretty cool features, but also not quite usable. I wonder what you think is the timescale for a usable Linux phone, maybe a video at some point? Would be interesting :-)

    • @davidt01
      @davidt01 2 роки тому

      Android is based on Linux.

    • @Quarky_
      @Quarky_ 2 роки тому +1

      @@davidt01 quite the difference there, Android uses only the Linux kernel for hardware support, not the rest. The rest is a mix of open and closed components, but fundamentally it is very different from the Linux OS. An example would be the filesystem.

  • @odebroqueville
    @odebroqueville 2 роки тому +5

    Hi Gary, I found this video a bit basic! Is there a way to protect oneself from zero-click exploits? Would one just have to avoid taking unrecognised calls?

    • @barneymm2204
      @barneymm2204 2 роки тому +3

      Check out Rob Braxman Tech's video Is there a Phone Backdoor? (Pegasus, Simjacker, SS7). Maybe that'll help.

    • @addust
      @addust Рік тому

      delete the messaging app, zero-clicks can travel via text from what i know

  • @taher9358
    @taher9358 2 роки тому

    I consider you a friend after watching this. Thanks Gary. Nice one mate.

  • @igoromelchenko3482
    @igoromelchenko3482 2 роки тому +1

    Thanks for such a solid review.

  • @autohmae
    @autohmae 2 роки тому +4

    I'm surprised we've not heard about governments going through the baseband processor. That has always been one of the big treads, even for mobile phones who aren't smartphones.

  • @idcrafter-cgi
    @idcrafter-cgi 2 роки тому +11

    10:48 and don't think a vm could protect against such things if it can hyperjack

    • @DrorF
      @DrorF 2 роки тому +2

      A VM did come to mind...
      I'm not sure it wouldn't be effective.
      Pegasus can't be perfect. I'm not saying they can't hack it, I'm just saying they gotta prioritize, and some things are lower priority than others.
      Not many people would use a VM for this, and even if you hacked the VM, it's on another machine, and the gains might be quite low. This might make it a low priority.

  • @Abhi00111
    @Abhi00111 2 роки тому

    was just waiting for your video 😊

  • @szanzarichards378
    @szanzarichards378 2 роки тому +1

    One my favorite tech channel with a clip of one my favorite shows👍

  • @Steve4Space
    @Steve4Space 2 роки тому +6

    That is creepy malware.

  • @ajmalnajath1399
    @ajmalnajath1399 2 роки тому +6

    I've never thought about a decentralised world this hard before. Holy shhhh

    • @georgesimon2730
      @georgesimon2730 2 роки тому +1

      Between your opinion and the 20th century...man, i really don't know...

  • @ggwho55
    @ggwho55 2 роки тому +1

    Thank you so much for these informations 👍☺️😊

  • @electricworld1968
    @electricworld1968 2 роки тому

    Thanks Gary for the interesting information.

  • @RoguishlyHandsome
    @RoguishlyHandsome 2 роки тому +11

    But when Batman does it's alright.

  • @colinstewart7123
    @colinstewart7123 2 роки тому +3

    Don't forget kids you always have the option of leaving the phone at another location. 🤣

  • @Srab23
    @Srab23 2 роки тому +1

    It would be incredibly interesting to see what the program looks like for the user and to have an analysis of the source code although this is very unlikely. I have no idea how these sorts of things operate on a fundamental level

  • @ron8654
    @ron8654 2 роки тому +2

    Great Video Gary.
    Is there any way to know if an old phone is infected with this spyware? Any anti virus application would help?

  • @micksmithson6724
    @micksmithson6724 2 роки тому +26

    Its not new, some 30 years ago the "infinity device" was doing the same with landlines. en.wikipedia.org/wiki/Infinity_transmitter

    • @An.Individual
      @An.Individual 2 роки тому +12

      A modern smart phone is more invasive then a land line.
      So while it isn't new, it is much more worrying.

    • @ok4405
      @ok4405 2 роки тому +1

      Link🧐

    • @micksmithson6724
      @micksmithson6724 2 роки тому +2

      @@An.Individual have you never watched the Matrix? ;) also you might be surprised by the Freaking scene

  • @tokiomutex4148
    @tokiomutex4148 2 роки тому +6

    Those who would give up essential Liberty, to purchase a little temporary Safety, deserve neither Liberty nor Safety.
    - Benjamin Franklin

  • @Mike_07
    @Mike_07 2 роки тому +2

    12:50 - This series is "Person of Interest". An absolutely must watch series. You wouldn't know what you were missing until you see this one.

    • @TheFourthWinchester
      @TheFourthWinchester 2 роки тому +2

      Best damn show of the last decade.

    • @Mike_07
      @Mike_07 2 роки тому +1

      @@TheFourthWinchester Very true.

  • @muddyexport5639
    @muddyexport5639 2 роки тому

    Thanks for the info. Another good vid.

  • @FLUXXEUS
    @FLUXXEUS 2 роки тому +3

    5:08 speaking of bugs... 😂
    (One casually flies by the screen)

  • @faustin289
    @faustin289 2 роки тому +6

    The name of this software fits. The guy that named it is as creative as the one who developed it

  • @CoffeeHead047
    @CoffeeHead047 2 роки тому +1

    that last bit was the most important part of the conversation.

  • @guilherme5094
    @guilherme5094 2 роки тому

    Thanks for the video.

  • @rudeviper
    @rudeviper 2 роки тому +18

    I have an advice for iOS user. Check for updates regularly. Android users can chill for now as if there is a security flaw or critical security and google has a patch it pushes to devices running android 5.0 through Play services so that non techy people are secure too without even knowing about it.

    • @plipogamez3173
      @plipogamez3173 2 роки тому

      ...wait a mo, are you saying security patches are installed onto my phone when I download software from the Play Store, and when I play games that are linked to my Google account?

    • @ashwinrawat9622
      @ashwinrawat9622 2 роки тому +9

      You wont have to worry about spywares on android or apple, the whole os is spyware.

    • @rudeviper
      @rudeviper 2 роки тому +4

      @@ashwinrawat9622 This one I agree. SWITCH TO LINUX 😂

    • @ManthaarJanyaro
      @ManthaarJanyaro 2 роки тому +1

      @@rudeviper Or compile Android yourself as it's open source.

    • @rudeviper
      @rudeviper 2 роки тому

      @@ManthaarJanyaro I care more about security more than I do about privacy. De googled phone is a very good option for privacy but what about security because as I said earlier its google that makes Android usable. And honestly I love google for this that they haven't just left android devices which are sold by other OEMs. They actually care about any android device you buy.

  • @BullwinkleFFMn
    @BullwinkleFFMn 2 роки тому +7

    I was under the assumption that ALL digital traffic was stored on the super computers in Utah anyway. I guess Pegasus just helped rip off data that wouldn't be sent to Utah automatically. So now that people are making UA-cam videos about pegasus the NSO group most likely has Peg 2 nearly ready to go.

  • @ashwani_kumar_rai
    @ashwani_kumar_rai 2 роки тому

    really liked the music at end

  • @gakwayadavid1558
    @gakwayadavid1558 2 роки тому

    This was amazing Gary

  • @dreffz
    @dreffz 2 роки тому +58

    Good thing my Nokia 3310 is immune to this plus I can use this as a weapon

  • @DamjanDimitrioski
    @DamjanDimitrioski 2 роки тому +4

    I use sensors disable option in developer menu, this forbids access to camera, mic, location(I hope), but probably a malware has access (as google has) above all restrictions.
    Tested with Facebook and instagram access to a camera crashes the app.

  • @svvvaya
    @svvvaya 2 роки тому

    8:26 love the disclaimer :D

  • @MohammedAli-vo8hq
    @MohammedAli-vo8hq 2 роки тому

    5:07 talk about bugs and they shall come - BUG FLIES PAST HIS FACE lol

  • @TheSamuiman
    @TheSamuiman 2 роки тому +5

    The great conspiracy for absolute power - these control freaks have all gone bonkers!

  • @bluegizmo1983
    @bluegizmo1983 2 роки тому +3

    There have been VERY few attack vectors that simply required clicking a link. It most cases, clicking a link is fine because even if the link starts an auto download, you would still have to actually click on the downloaded item and run it for the attack to work. Downloaded files do not automatically execute.

    • @mona.supremacy
      @mona.supremacy 2 роки тому

      Ever heard of browser APIs and WASM? There're plenty of ways how a WASM module can bypass browser sandboxing to infect a machine(basically in many ways: writing to storage/scheduling a malicious task/performing some calculations/accessing other processes' memory/etc or combined) having such a privilege as a "User's click". I'm not gonna say that we have to get rid of WASM or that it's so easy to do, but it's clearly possible to download and execute something with a single click.

    • @bluegizmo1983
      @bluegizmo1983 2 роки тому +2

      @@mona.supremacy I didn't mean it was impossible, just extremely unlikely. The kind of link clicking most people would be thinking of would be the random text messages spammers, or coming across a malicious link while browsing the web, and in those cases your chances of clicking anything that is a one click download & execute are basically non-existent. One click download & execute links are going to be used in VERY targeted attacks and/or by government agencies, which 99% of people don't need to worry about. Nobody who has a working one click link exploit is going to blast it all over the web or spam it in text messages where it will be found and patched quickly. They will keep it quiet and use it very sparingly in highly targeted attacks.

  • @MarioBuildreps
    @MarioBuildreps 2 роки тому

    Great video! 5:08 was that a fly?

  • @peterheywood7453
    @peterheywood7453 2 роки тому

    Brilliant insight 👍👍

  • @namelesske
    @namelesske 2 роки тому +36

    Everyone living in Communist China, just the marketing and branding is different.

    • @namelesske
      @namelesske 2 роки тому +2

      @American Freedom World Peace I’m reflecting to the new Pegasus fiasco not NSA

    • @Graeberwave
      @Graeberwave 2 роки тому

      Exactly. You already know Silicon Valley was taking notes! BECAUSE THEY GOT CONTRACTS IN CHINA TOO.

    • @wezikaluba3891
      @wezikaluba3891 2 роки тому +1

      Your Father is the thief but you think you are intelligent when you call your friend's father a thief.

    • @MetalTrabant
      @MetalTrabant 2 роки тому

      That's scary as hell... :-/

    • @isoboy2125
      @isoboy2125 2 роки тому

      Only difference with the rest of the world is that we get to live life pretending that our government does it with the best of intentions.

  • @kushagrabhavsar7327
    @kushagrabhavsar7327 2 роки тому +9

    how did "The guardian" find out who was under surveillance ? cause if such surveillance is happening then its a rookie mistake to leave evidence of it?

    • @KhanjanYT
      @KhanjanYT 2 роки тому +3

      Hackers of Hackers exist 😂

    • @mas921
      @mas921 2 роки тому

      a list of the "clients" was leaked. by clients I don't mean the governments, I mean the government's "clients" 😁

    • @kushagrabhavsar7327
      @kushagrabhavsar7327 2 роки тому

      @@mas921 government's clients as in gov agencies , or gov target's

    • @kushagrabhavsar7327
      @kushagrabhavsar7327 2 роки тому

      @@KhanjanYT if you're running a multi billion dollar surveillance thing, and your clients are governments than shame on NSO 😂

    • @kushagrabhavsar7327
      @kushagrabhavsar7327 2 роки тому +1

      @@jdeep7 i think NSO is not that stupid to let an employee blow the whistle , because believe it or not many powerful governments are involved. NSO must have some kind of leverage on their employees. and yes amnesty changed its statement to potential targets making the whole story void and null. I am interested on how Amnesty made the list...you oppose the government , you're in the list , you're an activist you get to be on the list

  • @stevecunningham8889
    @stevecunningham8889 2 роки тому +1

    Zero Days. Great documentary. Recommended.

  • @thesingularity1010
    @thesingularity1010 2 роки тому +2

    Love the POI reference 👍

  • @bartdart3315
    @bartdart3315 2 роки тому +6

    Between 5:08 and 5:14 in this video, a literal bug flies past the presenters nose...i noticed it, and i am sharing to get my reward. Its a zero day bug, as i write. 🤣🤣

  • @dasdaleberger5683
    @dasdaleberger5683 2 роки тому +43

    "there has never been a conspiracy in this country"

    • @owezzel
      @owezzel 2 роки тому +2

      🤣 some people really believe that too...

  • @MyMy-bj7de
    @MyMy-bj7de Рік тому +1

    Pegasus us just one of many. Surveillance is everywhere. My last two employers made us wear pins and communication devices that would track our location at the work place and even sound. The important thing now is not whether they are doing this or whether they should but rather how can we protect ourselves against this.

    • @GaryExplains
      @GaryExplains  Рік тому +2

      I assume the surveillance from your former employers was with your consent, which makes it very different to Pegasus.

  • @avxchfdu3904
    @avxchfdu3904 2 роки тому

    This is my first video view of you but I have already liked your content

  • @santarpanroy570
    @santarpanroy570 2 роки тому +15

    Master tip: change your govt by making people aware of these things

    • @namelesske
      @namelesske 2 роки тому

      You can try your luck for free in Russia or Hungary or Ukraine just to see the bottom of the ocean. Mafia is not happy about competitors.

  • @andresilvasophisma
    @andresilvasophisma 2 роки тому +7

    Why disable the camera when a piece of black electrical tape will suffice?

    • @ov3rkill
      @ov3rkill 2 роки тому +1

      Because microphones can still be on without you noticing.

    • @andresilvasophisma
      @andresilvasophisma 2 роки тому

      @@ov3rkill he only mentioned disconnecting the camera.

    • @Anon1370
      @Anon1370 2 роки тому +1

      I think id need to pay people to watch me...Anyway if anyones watching enjoy

  • @prbnrjl
    @prbnrjl 2 роки тому +1

    I hope future phone cameras will have physical camera cover and may be a led indicator hardwired with the mics so that when a mic is on the led can indicate. Not very convenient but may be not a bad idea.

  • @thegoonisgood77
    @thegoonisgood77 2 роки тому

    I have an RFID phone pouch, I think that is meant to block signals into and out of the phone, while in there. Is that also a bit of a half baked workaround? I.e keep the phone in the pouch when driving around and use a navman instead, and take it out when needed? not a full stop, but something...?

  • @aaronrolls
    @aaronrolls 2 роки тому +32

    I'm more concerned with those hacks destroying my battery life.

  • @lucasgssilveira
    @lucasgssilveira 2 роки тому +4

    I wonder if any among the compromised devices listed in the leak runs Linux, and how safe are Linux phones in general. Since some of the targeted individuals are serious journalists doing an essential job, it is important they continue to have access to secure devices, maybe a secondary device running Linux could be a good tool if they prove to be safer.

    • @fayebradshaw4221
      @fayebradshaw4221 2 роки тому +3

      Agreed, at least until they become very popular

    • @lucasgssilveira
      @lucasgssilveira 2 роки тому +2

      @American Freedom World Peace I meant as a secondary device, especially for journalists and human rights activists, maybe even politicians. Unfortunately Linux phones aren't mature enough to be the main daily driver, but they could potentially be a fantastic secondary device and keep private information more secure.

    • @lowpowerlarry9957
      @lowpowerlarry9957 2 роки тому +1

      Android phones are linux.

    • @lucasgssilveira
      @lucasgssilveira 2 роки тому +2

      @@lowpowerlarry9957 Technically yes but also not really. Android runs a heavily modified Linux kernel but also many specific libraries and binaries. By Linux phones, I mean phones running the standard kernel and GNU libraries.

  • @chrisb1292
    @chrisb1292 2 роки тому +1

    Is the malware permanent? I remember reading several security publications stating that it was in fact possible to perform zero touch hacks on Android as well as iOS with latest updates respectively. But none of the different malwares were able to survive a fresh boot due to very tight boot partition security (especially Samsung KNOX).

  • @JoePolaris
    @JoePolaris 2 роки тому +1

    Would wiping your phone clean and re-installing from scratch with newer code be a fix ? Alternatively, obscurity tactics by not using a smart phone , using a flip phone be a means of protection?