TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Pegasus spyware found on journalists’ phones, French intelligence confirms

404 pointsby shivbhattalmost 4 years ago

14 comments

mcguirealmost 4 years ago
&quot;<i>Bredoux added: “It takes a bit of time to realise it, but it’s extremely unpleasant to think that one is being spied on, that photos of your husband and children, your friends – who are all collateral victims – are being looked at; that there is no space in which you can escape. It’s very disturbing.”</i>&quot;<p>Welcome to the future! It&#x27;s pretty much the same as the past, only more effective.
评论 #28046288 未加载
评论 #28042499 未加载
评论 #28045747 未加载
canistelalmost 4 years ago
Ironically, users themselves are disallowed from rooting their phones.<p>Right to root, is right to repair.
评论 #28038371 未加载
评论 #28038415 未加载
评论 #28038385 未加载
belteralmost 4 years ago
I have seen some manuals were released and some tools reverse engineered. What is currently the best link for a deep technical overview of how these tools work&#x2F;worked?
评论 #28039931 未加载
评论 #28040129 未加载
DSingularityalmost 4 years ago
Well, I thought it was only terrorists that were targeted?
评论 #28038752 未加载
评论 #28038682 未加载
评论 #28043925 未加载
评论 #28043251 未加载
评论 #28038670 未加载
评论 #28039523 未加载
SubzeroCarnagealmost 4 years ago
Slight OT: the malware indicators of compromise that Amnesty International released have no license, thereby prohibiting use in other projects as far as I understand.<p><a href="https:&#x2F;&#x2F;github.com&#x2F;AmnestyTech&#x2F;investigations&#x2F;issues&#x2F;11" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;AmnestyTech&#x2F;investigations&#x2F;issues&#x2F;11</a><p>If anyone can help on that front it&#x27;d be much appreciated.
评论 #28041377 未加载
firebazealmost 4 years ago
If I were a journalist I&#x27;d almost feel insulted if I or at least my organization hadn&#x27;t been targeted.
specialistalmost 4 years ago
How would I factory reset and then cold boot my phone?<p>I&#x27;m very noob wrt firmware and rootkits and even CPU microcode. My understanding is some kind of factory reset is no longer feasible. And certainly no longer verifiable.<p>--<p>Ages ago, I proposed that electronic voting machines (tabulators) boot from CD-ROM. Device&#x27;s ROM would only have bare minimum boot loader. Imagine some super minimal embedded controller, zero unnecessary features. Mount a CD, run the optical scanner, a few buttons, 2 line LCD panel, dot matrix printer.<p>Assume 2000s best practices election administration. Scantron style ballots, precinct-based poll sites, tabulation occurs the moment polls close, tabulated results posted publicly.<p>These CD-ROMs would then by secured, as much as possible, thru physical chain of custody. Just like all other election artifacts. They&#x27;d also contain snapshot of entire source and toolchain and election data, so any one could inspect them, reproduce the builds, verify the dataset, etc.<p>My jurisdiction had 100s of poll sites. Instead of programming each ballot scanner, they&#x27;d burn CD-ROMs.<p>Any way.<p>I mention this because I think such simplistic view of secured computing is no longer feasible. And to consider all the things we&#x27;d have to give up to return such a world.<p>Could I put a phone&#x27;s entire dev stack onto some WORM media and then reimage the device? What would that even look like?
评论 #28049814 未加载
PradeetPatelalmost 4 years ago
Is there no regulatory or compliance requirements for surveillance software?<p>Instead of blaming the victims of pegasus, we should focus our attention on the lack of actions from key policymakers and regulatory bodies. It is not possible for every individual to be a technical expert when it comes to malware removal, but we can reduce the likelihood of misusing surveillance software by creating an ethical framework around it, backed by nations that value freedom and democracy.
评论 #28044138 未加载
评论 #28041316 未加载
评论 #28046771 未加载
评论 #28042220 未加载
olliejalmost 4 years ago
but remember, NSO is just doing the dirty work that needs to be done &#x2F;s<p>They&#x27;re knowingly selling to untrustworthy organizations knowing they&#x27;ll be used for criminal purposes. They&#x27;re criminals, and should be treated as such.
评论 #28041617 未加载
johnchristopheralmost 4 years ago
I wonder what would have happened to windows phone&#x2F;lumias if things had turned out differently.<p>I also wonder if there was something like that when windows mobile was on the market.
评论 #28040814 未加载
评论 #28040662 未加载
sss111almost 4 years ago
Could a pegasus infection be detected with something like Litte Snitch or Lulu for iphones, in my mind, it&#x27;d be suspicious if some application was sending gigabytes of data over the wire
Goetyalmost 4 years ago
So it was the French. &#x2F;s
kota2almost 4 years ago
RFI and France24 did some reporting a few days ago how everyone from activists to journalists were targeted, see: <a href="https:&#x2F;&#x2F;www.france24.com&#x2F;en&#x2F;technology&#x2F;20210718-private-israeli-malware-used-to-spy-on-journalists-activists-and-politicians" rel="nofollow">https:&#x2F;&#x2F;www.france24.com&#x2F;en&#x2F;technology&#x2F;20210718-private-isra...</a>
kota2almost 4 years ago
Is there a way to check Android devices for infections yet?