• You may have heard about the scandals related to tracking devices found on high-ranking politicians in Europe and Asia. Among others, tracking devices were found on the hands of former German Chancellor Angela Merkel, various journalists, human rights activists, dissidents and many others. Yes, we are talking about good old Pegasus
• What is this Pegasus to you? Is it in the same room with us? Yes, it can be in the same room with us. Easy. In general, this is the development of the intelligence services of a company from Israel in favor of other intelligence services already located abroad. It cleverly installs itself on the victim's mobile phone and controls his entire future life.
• So, what can it do? Read your geographic location. That is, the specialist behind the screen sees exactly where you are, even if you do not indicate your geographic location. He sees your entire address book even without GetContact, listens to all your conversations and sees all your SMS messages. It can also access your calendar and even control your alarm clock! But that's not scary. What's scary is that at any moment it can turn on the camera or microphone on your device and find out what interesting things you're doing right now. Not to mention that it has access to all the files on the device and can, if necessary, destroy your entire system, turning your beloved iPhone into a brick.
• But that's not all. Pegasus sees all your traffic. And not only where they go (like SORM),, but also the specific contents of the packets, because they are already decrypted on the device. That is, it sees through your messages in Telegram and WhatsApp, your mail and your traffic. This is already scary and unpleasant.
• Now about the most important thing. Making such a tracker is as easy as pie. Seriously, it's not that difficult. Look, look at your children's tracking devices. There are geotags, you can turn on the microphone, there is also traffic control. The problem is not to make such programs, the problem is to infect the phone so that the user does not notice anything, and the security system of the operating system does not work. A dog was buried here. A big dog, the size of a mastiff. How could Pegasus infect the iPhones of politicians and journalists, even without contact? They used social networks before. Infectious technology does not exist now. I do not vouch for this, but Apple provided Pegasus with a backdoor that allows you to infect the device without being noticed. Although Pegasus has been going down in the sunset for several years, its work is still going on. So follow the instructions of Infosec! Security to all!