the vulnerability on your device which allows them to take total control of that device. anything you can do on that device, the attacker, in this case, the government, can do. they can read your email, they can collect every document, they can look at your contact book, they can turn the location services on. they can see anything that is on that phone instantly and send it back home to the mother ship. they can do the same with laptops. the other prong that we forget so frequently is that in many cases they don t need to hack our devices. they can simply ask google for a copy of our email box because google saves a copy of that. what about enabling your microphone camera? if you can do it, they can do it. it is trivial to remotely turn on your microphone or to activate your camera so long as you have systems-level access. if you had hacked someone s device remotely, anything they can do, you can do.
device. once they do this, by detecting a vulnerability in the software that your device runs such as apple s ios or microsoft windows, it can craft a special kind of attack code called an exploit. they then launch this exploit at the vulnerability on your device which allows them to take total control of that device. anything you can do on that device, the attacker, in this case, the government, can do. they can read your email, they can collect every document b they can look at your contact book, they can turn the location services on. they can see anything that is on that phone instantly and send it back home to the mother ship. they can do the same with laptops. the other prong that we forget so frequently is that in many cases they don t need to hack our devices. they can simply ask google for a copy of our email box because google saves a copy of that. what about enabling your microphone camera? if you can do it, they can do
anything you can do on the device, the attacker, in this case, the government can do. they can read your e-mail, collect every document, look at your contact book, turn the location services on. they can see anything that is on that phone instantly and send it back home to the mothership. they can do the same with laptops. other prong that we forget so frequently is that in many cases they don t need to hack our devices. they can simply ask google for a copy of our e-mail box. because google saves a copy of that. what about enabling your microphone camera? if you can do it, they can do it. it is trivial to remotely turn on your microphone or to activate your camera so long as you have systems level access. if you had hacked someone s device remotely, anything they can do, you can do. they can look up your nose, they can record what s in the room.