There seems to be a pattern. The Pegasus exploit, Simjacker exploit and SS7 exploit are all very similar. This is all conjecture (though a well thought one). Could there be a backdoor on our phones? And if there is one, where would it be?
In this video, I tell you where I think it could be if it existed.
-----------------------------------
I'm the Internet Privacy Guy. I'm a public interest technologist. I'm here to educate. You are losing your Internet privacy and Internet security every day if you don't fight for it. Your data is collected with endless permanent data mining. Learn about a TOR router, a VPN , antivirus, spyware, firewalls, IP address, wifi triangulation, data privacy regulation, backups and tech tools, and evading mass surveillance from NSA, CIA, FBI. Learn how to be anonymous on the Internet so you are not profiled. Learn to speak freely with pseudo anonymity. Learn more about the dangers of the inernet and the dangers of social media, dangers of email.
I like alternative communication technology like Amateur Radio and data communications using Analog. I'm a licensed HAM operator.
Support this channel on Patreon! [ Ссылка ]
Contact Rob on the Brax.Me App (@robbraxman) for encrypted conversations (open source platform)
[ Ссылка ] Store for BytzVPN, BraxRouter, De-googled Privacy AOSP Phones, Linux phones, and merchandise
[ Ссылка ] Premium VPN with Pi-Hole, Cloud-Based TOR Routing
[ Ссылка ] Cybersecurity Reference
[ Ссылка ] Privacy Focused Social Media - Open Source
My GPG Public Key [ Ссылка ]
Please follow me on Odysee! (Previously LBRY)
[ Ссылка ]
Ещё видео!