Should we chat, too? Security analysis of WeChat’s MMTLS encryption protocol. ~tech security Article 11 191 words 13 votes
The not-so-silent type. Vulnerabilities across keyboard apps reveal keystrokes to network eavesdroppers. ~tech security privacy Article 16 015 words 9 votes
NSO group’s Pegasus spyware returns in 2022 with a trio of iOS 15 and iOS 16 zero-click exploit chains ~tech security ios.15 ios.16 apple Article 3664 words 4 votes
Pegasus vs. Predator - Dissident’s doubly-infected iPhone reveals Cytrox mercenary spyware ~tech ios Article 5492 words 3 votes
New York Times journalist Ben Hubbard hacked with Pegasus after reporting on previous hacking attempts ~news usa journalism Article 1896 words, published Oct 24 2021 8 votes
A comparative analysis of security, privacy, and censorship issues in TikTok and Douyin, both developed by ByteDance ~tech privacy security social media Link 5 votes
An examination of Zoom's encryption and potential areas of concern in their infrastructure, including the transmission of meeting encryption keys through China ~tech privacy Article 2320 words 6 votes
Censored contagion - How information on the coronavirus is managed on Chinese social media ~tech social media Article 4605 words 9 votes
NSO exploited WhatsApp to hack at least 1400 phones and spy on top government officials at US allies ~tech facebook privacy security Article 1077 words 16 votes