On quite a few news websites there’s a new hot topic how the Australian “Ghost” app got hacked by Interpol and has led to prevention of murders and resulted in a few arrests.
Is there any information out there on what security methods Ghost used and how it was exploited?
You must log in or # to comment.
Isn’t that the one that they built on their own?
What? Like “I’lL mAkE mY oWn EnCrYpTiOn”?
The administrator (creator) aledgedly created the platform 9 years ago when he was 23…
Actually I’m thinking of Phantom Secure. They built phones to go along with their app services.
No, it was built by three-letter agencies and used to spy on cartels and others.