Damus
FLASH profile picture
FLASH
@flash
⚡🚨🇮🇱 ALERT - Israeli spyware company Paragon Solutions accidentally revealed details of its Graphite spyware after a LinkedIn post by its chief compliance officer included a screenshot of the live control panel.

The dashboard reportedly showed active tools to monitor targets via WhatsApp, Signal, and Telegram, including options for full remote device access.

The leak appeared to confirm Graphite can:
➥ Use zero-click exploits
➥ Read encrypted messages (via device compromise)
➥ Activate microphones/cameras
➥ Extract data without user interaction

Paragon markets Graphite as an “ethical” government tool, but it has previously been linked to surveillance of journalists and civil society members.

The company quickly deleted the post, but screenshots spread widely.
43❤️6♥️1👍1🔥1🤙1🫥1
Thethird0cnzo · 6d
https://image.nostr.build/11922ddd8d01a89bc2ce907398b9dcad6e13189f0a814fc29b6971bcdd218480.jpg
U-P-G-R-A-Y-E-D-D · 6d
nostr:nprofile1qqs9g69ua6m5ec6ukstnmnyewj7a4j0gjjn5hu75f7w23d64gczunmgpz4mhxue69uhhyetvv9ujuerfw36x7tnsw43q0uc5de is the way Get GrapheneOS or get raped
G Force G · 6d
I wonder if the backdoor they use is baked into apps like telegram and whatsapp. That would make sense based on the fact that these companies are "Corporate partners" of five eyes.
Michael Dobson · 6d
Technically, it’s not reading encrypted messages, it’s reading messages before they are encrypted.