Pegasus Spyware Explained: Non-Technical

Поділитися
Вставка
  • Опубліковано 30 вер 2024

КОМЕНТАРІ • 28

  • @josephcro2138
    @josephcro2138 2 роки тому +25

    This is extremely well produced

    • @realtimecyber
      @realtimecyber  2 роки тому +4

      Thanks. Glad you liked it. Make sure to subscribe for more!

  • @thee_master
    @thee_master Рік тому +15

    Snowden was right.

  • @davidletarte214
    @davidletarte214 Рік тому +7

    man i have old phones whose bootloaders cannot be unlocked, they cannot be rooted etc... so how come these guys can get root access with less than a click and i spend all evening only to figure out a carrier/ manufacturer has locked me out of the process on a phone that i own!? so frustrating!

    • @chillvibesman4564
      @chillvibesman4564 5 місяців тому

      Say you have a trusted file like your phone's default messages app.
      That messages app might "pre-load" links (aka speculative loading) that allow the execution of malicious code hosted there. Even more nefariously attackers can hide malicious code in mms messages (like a photo) that run code as well.
      Sometimes, when the messages app preloads content the way it handles website data may be vulnerable to exploitation. In some rare cases it might allow a complete install of a new background application that the user may never be aware of.
      Unfortunately, in this case, yes, the system directories are locked down, however, if someone were to find a way to take advantage of an app's privileges on the system they could install malicious applications.
      In this case, you don't necessarily have to unlock the bootloader to install a "root" directory app since a "trusted" application is doing all of the work the system just does what the application is telling it to.
      What you're pointing out is the double edge sword of security. As an example, if I a safe that contains valuables I want it to be as hard as possible for a bad actor to get into the safe, obviously. However, if I make it too easy to get into the safe you have to start questioning what the point of the safe is in the first place.
      In this case, manufacturers have tried to lock the device down completely hoping that no one good ever has to come in and look around. The major issue with this is... well... if someone did manage to get in it's much much harder to fix the issue.
      There's a delicate balance here and historically it has worked. Unfortunately for the public that means these difficult to crack safes are completely crackable by large organizations like governments and not normal hackers (mostly however it is still very possible to get malware on andriod).

    • @HYL-c9z
      @HYL-c9z 3 місяці тому

      they are experts in programing and state, nation funded terrorists. if you get attacked, relocate to a new secure location.
      the equipment you paid a thousand for are only a few hundred in parts.

    • @SlapbackGOD
      @SlapbackGOD 8 днів тому

      Hahahah same. Tried to update my firmware but bootloader was locked so had to ask Xiaomi to unlock it so I could update my rom.. And these guys do it with one click? 🤔

  • @XAUBULL
    @XAUBULL 2 місяці тому +2

    How do you even code something like this

    • @realtimecyber
      @realtimecyber  2 місяці тому

      By being some of the top hackers in the world.

  • @richvanek1363
    @richvanek1363 Рік тому +2

    Sketchy asf the gooberment knows this, doesn't, increase punishment, and require subpoena for the devices binding with my device.
    Or make google set attack against NSO, people. Notice I didnt say company.
    Ebay 7, Tmob, google.

  • @dietrichdietrich7763
    @dietrichdietrich7763 Рік тому +3

    zero-click exploits all apps

  • @potatisskiva
    @potatisskiva Рік тому +1

    This video was extremely stressful to watch. Too many images! Also it wasn't semi-technical, it was non-technical.

  • @MaxBlack-i9s
    @MaxBlack-i9s 11 місяців тому +1

    Im currently dealing with this hack. Its hacked 3 iphone 15's and every account including my work

  • @JohnBrown722so
    @JohnBrown722so 2 роки тому +2

    We know what you do.

  • @Awesomsimity
    @Awesomsimity 6 місяців тому +1

    good vid

  • @georgewaltones2200
    @georgewaltones2200 Рік тому

    and we wont stop

  • @chenglock6274
    @chenglock6274 2 роки тому

    Use earphone and speaker blocker to appeal silent so that they can't listen to your conversation

  • @mirrormelville7097
    @mirrormelville7097 2 роки тому +1

    You dont mind telling me you telegram. I got 5bags to buy this

    • @chrollolucifer2593
      @chrollolucifer2593 2 роки тому

      Do you have the tool?

    • @simonshaffer5813
      @simonshaffer5813 2 роки тому

      do you really think that's nearly enough to buy a world class spyware engineered by the best minds in an Israeli Cyber security firm?

    • @unknow.n
      @unknow.n 2 роки тому +2

      Ask nso group costs like 3-20 million

    • @chrollolucifer2593
      @chrollolucifer2593 2 роки тому

      @Alberto James whats your telegram/

    • @nevus105
      @nevus105 Рік тому +1

      @@chrollolucifer2593 u got 5bags?