Remix.run Logo
chasil 3 hours ago

The actual text from the article implies that OS exploits compromised the device.

"The UAE government owns majority holdings in telecom companies Etisalat and Du. This gives security services the power to observe all communications on their networks.

"The Arab state has also used the Israeli-developed software Pegasus which allows agents to listen into private calls and read messages, even if they are shared on encrypted apps like WhatsApp,.

"The spyware can infect a device even without the user activating a link - such as via a WhatsApp call, even if it isn't answered.

"Once inside, it can access all WhatsApp messages, logos and contacts."

ufmace 3 hours ago | parent [-]

I don't think that means anything as the author of the article almost certainly has no clue about anything but what the Government there told him. They're just quoting general knowledge and speculation by other equally-uninformed third parties.

chasil 2 hours ago | parent [-]

Well, how would you a) obtain the incriminating photo, then b) determine that it had been transmitted?

An OS exploit and stat() for an atime would do it.

netdur 9 minutes ago | parent [-]

By asking Meta polity