The Triangulation cyber espionage tool uses outstanding stealth techniques after infection of smartphones "the victim receives an invisible iMessage attachment with a zero-click exploit". First use of Canvas fingerprinting. Daws a pink triangle and checks a "checksum" based on hardware-linked output. Likely identifying a device.

Capable to turn on the microphone... It can location (GSM/GPS). Attackers "used private undocumented APIs"?securelist.com/triangulation-v

Follow

@LukaszOlejnik

> Likely identifying a device.

I don't think it can identify an individual device, but rather the hardware revision and potentially versions of the software involved in the graphics stack.

Sign in to participate in the conversation
Qoto Mastodon

QOTO: Question Others to Teach Ourselves
An inclusive, Academic Freedom, instance
All cultures welcome.
Hate speech and harassment strictly forbidden.