vimarsana.com

Latest Breaking News On - Microphone camera - Page 1 : vimarsana.com

Transcripts for MSNBC The 11th Hour With Brian Williams 20190917 06:43:00

the vulnerability on your device which allows them to take total control of that device. anything you can do on that device, the attacker, in this case, the government, can do. they can read your email, they can collect every document, they can look at your contact book, they can turn the location services on. they can see anything that is on that phone instantly and send it back home to the mother ship. they can do the same with laptops. the other prong that we forget so frequently is that in many cases they don t need to hack our devices. they can simply ask google for a copy of our email box because google saves a copy of that. what about enabling your microphone camera? if you can do it, they can do it. it is trivial to remotely turn on your microphone or to activate your camera so long as you have systems-level access. if you had hacked someone s device remotely, anything they can do, you can do.

Transcripts for MSNBC The 11th Hour With Brian Williams 20190917 03:43:00

device. once they do this, by detecting a vulnerability in the software that your device runs such as apple s ios or microsoft windows, it can craft a special kind of attack code called an exploit. they then launch this exploit at the vulnerability on your device which allows them to take total control of that device. anything you can do on that device, the attacker, in this case, the government, can do. they can read your email, they can collect every document b they can look at your contact book, they can turn the location services on. they can see anything that is on that phone instantly and send it back home to the mother ship. they can do the same with laptops. the other prong that we forget so frequently is that in many cases they don t need to hack our devices. they can simply ask google for a copy of our email box because google saves a copy of that. what about enabling your microphone camera? if you can do it, they can do

Transcripts for MSNBC The 11th Hour With Brian Williams 20190917 08:43:00

anything you can do on the device, the attacker, in this case, the government can do. they can read your e-mail, collect every document, look at your contact book, turn the location services on. they can see anything that is on that phone instantly and send it back home to the mothership. they can do the same with laptops. other prong that we forget so frequently is that in many cases they don t need to hack our devices. they can simply ask google for a copy of our e-mail box. because google saves a copy of that. what about enabling your microphone camera? if you can do it, they can do it. it is trivial to remotely turn on your microphone or to activate your camera so long as you have systems level access. if you had hacked someone s device remotely, anything they can do, you can do. they can look up your nose, they can record what s in the room.

© 2025 Vimarsana

vimarsana © 2020. All Rights Reserved.