Wow, I've seen some sensationalistic articles before but this one is pretty sweet.<p>Let me see if I can recap on the main points.<p>1) There supposedly is software that doesn't appear to exist anywhere outside of a research lab.<p>2) This software as written doesn't actually do what it is reported nefariously to do because it is bugged.<p>3) It clearly declares the capabilities it intends to use to the user via a standard install screen which can be declined.<p>In summation, there may or may not be a program somewhere that isn't currently functional and of which the true intent is unknown.<p>If the above is accurate then I might have reports of thousands of trojans across various operating systems, or maybe I don't, who knows!
In other news, if you click INSTALL on an application that tells you it's touching ALL of your phone calls, it might do stuff you don't want with those phone calls.<p>/headdesk
Recording phone calls is useful to suspicious girlfriends, and about nothing else. I doubt any identity thief would listen to your phone calls in hopes that you mention a credit card number or something of value.
This is an app (application) and not the classic definition of Trojan Horse virus: <a href="http://en.wikipedia.org/wiki/Trojan_horse_(computing)" rel="nofollow">http://en.wikipedia.org/wiki/Trojan_horse_(computing)</a>