but the email address provided for media inquiries – for a staffer at "high stakes public strategy firm" Mercury – returned a "User address unknown" error.
But they know you , now. Grab your tin foil hats boys and girls !
Indian IT Minister Ashwini Vaishnaw has denied the nation illegally used the NSO Group's Pegasus spyware, but hasn't denied that India used it. The existence of Pegasus is not news. But over the weekend, Amnesty International, French outfit Forbidden Stories and a dozen publications around the world alleged the software has …
Yes Thomas. The PRC and its entrepreneurs didn''t drag its population out of abject poverty by being prissy and finicky. And why wouldn't they sell it? Nice profit from selling it to others to facilitate their spying on their own and destroying themselves.
British Ministry of Defence denied having conducted illegal drone strikes in Afghanistan. Meanwhile, the Russian Ministry of Justice denied denying... , while Mr Hitler dismissed the claims of illegal harassment of German citizens with Jewish ancestry. There, my payday from all three.
The obligatory conclusion from that statement is that there has been "legal" use of the Pegasus spyware.
Logic is extremely simple. If India didn't use the software, the Minister would have been boasting about it.
He's not, so they're using it.
Whether governments used the Pegasus spyware legally or illegally, and whether or not NSO supplied it to anyone other than a responsible government department, are beside the point. The point is that the software exists, and is in use; therefore, the vulnerabilities that enable it to work still exist.
Which means any Fred in the Shed with the time and the inclination to read some long and boring documents and experiment with a few second-hand phones that can be bought cheaply on the Internet could, if they applied themself to the task, recreate what Pegasus does.
Have you forgotten the 1980s already? Suddenly, out of almost nowhere, a bunch of kids who otherwise might have been punks started getting creative with the microcomputers of the day and making their own video games. Multiple times, on incompatible systems; and with scant regard for anyone standing over them with a big stick demanding payment for the use of a character. It was all about proving you could do it.
Well, there's no reason to suppose somebody has not thought "I wonder if I could sneak an app onto a phone ....." and gone ahead and done it.
If the good guys can get in, that means the bad guys can also get in. And someone might be aiding and abetting them.