this post was submitted on 18 Sep 2024
12 points (100.0% liked)

Ask Lemmy

26890 readers
1687 users here now

A Fediverse community for open-ended, thought provoking questions

Please don't post about US Politics. If you need to do this, try [email protected]


Rules: (interactive)


1) Be nice and; have funDoxxing, trolling, sealioning, racism, and toxicity are not welcomed in AskLemmy. Remember what your mother said: if you can't say something nice, don't say anything at all. In addition, the site-wide Lemmy.world terms of service also apply here. Please familiarize yourself with them


2) All posts must end with a '?'This is sort of like Jeopardy. Please phrase all post titles in the form of a proper question ending with ?


3) No spamPlease do not flood the community with nonsense. Actual suspected spammers will be banned on site. No astroturfing.


4) NSFW is okay, within reasonJust remember to tag posts with either a content warning or a [NSFW] tag. Overtly sexual posts are not allowed, please direct them to either [email protected] or [email protected]. NSFW comments should be restricted to posts tagged [NSFW].


5) This is not a support community.
It is not a place for 'how do I?', type questions. If you have any questions regarding the site itself or would like to report a community, please direct them to Lemmy.world Support or email [email protected]. For other questions check our partnered communities list, or use the search function.


Reminder: The terms of service apply here too.

Partnered Communities:

Tech Support

No Stupid Questions

You Should Know

Reddit

Jokes

Ask Ouija


Logo design credit goes to: tubbadu


founded 1 year ago
MODERATORS
 

On quite a few news websites there's a new hot topic how the Australian "Ghost" app got hacked by Interpol and has led to prevention of murders and resulted in a few arrests.

Is there any information out there on what security methods Ghost used and how it was exploited?

top 6 comments
sorted by: hot top controversial new old
[–] [email protected] 4 points 1 month ago
[–] [email protected] 4 points 1 month ago

Very likely the Aussie police won't say exactly. All they have said so far is the devices are modified smart phones and they compromised the devices with a supply chain attack.

https://www.afp.gov.au/news-centre/media-release/afp-operation-kraken-charges-alleged-head-global-organised-crime-app

Main parts

The handsets, which were a modified smart phone, were sold for about $2350, which included a six-month subscription to an encrypted network and tech support.

The administrator regularly pushed out software updates, just like the ones needed for normal mobile phones.

But the AFP was able to modify those updates, which basically infected the devices, enabling the AFP to access the content on devices in Australia.

[–] [email protected] 2 points 1 month ago (2 children)

Isn’t that the one that they built on their own?

[–] [email protected] 2 points 1 month ago (1 children)

What? Like "I'lL mAkE mY oWn EnCrYpTiOn"?

The administrator (creator) aledgedly created the platform 9 years ago when he was 23...

[–] [email protected] 1 points 1 month ago

Actually I’m thinking of Phantom Secure. They built phones to go along with their app services.

[–] [email protected] 1 points 1 month ago

No, it was built by three-letter agencies and used to spy on cartels and others.