On quite a few news websites there’s a new hot topic how the Australian “Ghost” app got hacked by Interpol and has led to prevention of murders and resulted in a few arrests.

Is there any information out there on what security methods Ghost used and how it was exploited?

  • Brkdncr@lemmy.world
    link
    fedilink
    arrow-up
    1
    ·
    3 months ago

    Actually I’m thinking of Phantom Secure. They built phones to go along with their app services.