It happened again.
Another day, another leak: the Internet is full of reports of large data breaches, this time in the form of military-grade malware purchased from NSO Group, an Israeli-based hacker-for-hire group.
The software infects phones and enables operators to extract messages, photos, and emails, plus record calls and secretly activate microphones and cameras.
Among the 50,000 contacts on the list are French leader Emmanuel Macron (who then promptly ditched his phone and changed his number), plus an estimated 1,000 dissidents and human-rights journalists around the world.
Pegasus isn’t the only one peering in. Just last week, the Democratic National Committee made headlines by reportedly urging SMS carriers to censor private text messages with COVID-19 “misinformation.”
Think about that for a moment...
Look, we’re in an age where, as we keep saying, privacy has gone the way of the dodo bird.
And protecting your privacy from the government, from a political party, or from privately developed, commercial spyware sold to military, intelligence and law enforcement agencies, is a pipe dream.
We all must go about our business assuming that our iPhones and Androids, our home security systems and our laptops, all are compromised.
But there are still steps we can take to mitigate our privacy from being sold to everyone else. Privacy is still important.
And that’s why we wrote this Black Paper on Securing Your Digital Life, a follow-up to Part One. Here, we’ll focus on phone, enterprise, and offline solutions.
It may seem futile to take these steps amid such headlines, but there is still much you can do to take back control of at least some of your more critical information. Be informed. Know the threats. And be proactive.
Another day, another leak: the Internet is full of reports of large data breaches, this time in the form of military-grade malware purchased from NSO Group, an Israeli-based hacker-for-hire group.
The software infects phones and enables operators to extract messages, photos, and emails, plus record calls and secretly activate microphones and cameras.
Among the 50,000 contacts on the list are French leader Emmanuel Macron (who then promptly ditched his phone and changed his number), plus an estimated 1,000 dissidents and human-rights journalists around the world.
Pegasus isn’t the only one peering in. Just last week, the Democratic National Committee made headlines by reportedly urging SMS carriers to censor private text messages with COVID-19 “misinformation.”
Think about that for a moment...
Look, we’re in an age where, as we keep saying, privacy has gone the way of the dodo bird.
And protecting your privacy from the government, from a political party, or from privately developed, commercial spyware sold to military, intelligence and law enforcement agencies, is a pipe dream.
We all must go about our business assuming that our iPhones and Androids, our home security systems and our laptops, all are compromised.
But there are still steps we can take to mitigate our privacy from being sold to everyone else. Privacy is still important.
And that’s why we wrote this Black Paper on Securing Your Digital Life, a follow-up to Part One. Here, we’ll focus on phone, enterprise, and offline solutions.
It may seem futile to take these steps amid such headlines, but there is still much you can do to take back control of at least some of your more critical information. Be informed. Know the threats. And be proactive.
It happened again. Another day, another leak: the Internet is full of reports of large data breaches, this time in the form of military-grade malware purchased from NSO Group, an Israeli-based hacker-for-hire group. The software infects phones and enables operators to extract messages, photos, and emails, plus record calls and secretly activate microphones and cameras.…
- Members Only Content -
You need to be a member of Sovereign Confidential to access this content.
If you are a member already, please login below.