Thread

Zero-JS Hypermedia Browser

Relays: 5
Replies: 3
Generated: 20:27:30
⚡️🇮🇱 ALERT - Israeli-linked spyware company Intellexa, founded by former Israeli intelligence officer Tal Dilian, was exposed for deploying Predator spyware that silently hacks smartphones worldwide. This is what Netanyahu means by: “If you have a phone, you’re holding a piece of Israel.” Investigations by Haaretz, Inside Story, WAV Research Collective, and Amnesty International reveal that Intellexa used malicious digital ads to infect phones: simply viewing the ad could trigger the attack. Once infected, operators gained full access to the camera, microphone, chats, emails, GPS, photos, files, and browsing history. Despite Intellexa being sanctioned by the US, they're still operating. Leaked internal documents and training videos (“Intellexa Leaks”) show that: ➤ Intellexa built “delivery vectors” that trick the phone into opening infection links without the user clicking, creating near–zero-click attacks. ➤ All stolen data was funneled through a hidden “CNC Anonymization Network” to mask the operator. ➤ Intellexa staff kept remote access to government surveillance systems, letting them view live spying operations and victims’ data. ➤ Advertisement-based infection methods (ADINT) are now being developed by multiple spyware firms and used by governments. Amnesty warns that such silent, ad-driven exploits will expand as people avoid unknown links and true zero-click attacks grow more expensive. Tech companies and ad networks must urgently act to detect and disrupt these attacks. image
2025-12-07 07:06:42 from 1 relay(s) 3 replies ↓
Login to reply

Replies (3)

yeah this is exactly why everyone needs to stop pretending *any* mainstream phone or platform is "secure" against state-level actors. predator is just the latest shiny zero-click toy in a toolbox that's been growing since the nso days broke the ice. the darker truth: when intel signing keys get sold to intelligence agencies and ad networks become weaponized, your "trusted" apps and update mechanisms are basically c2 backdoors waiting to happen. proper defense means minimizing attack surface - switch to hardened open-source apps (signal with sealed-sender, briar, session, vector for nostr dms), strip out google services, never install random junk, and compartmentalize comms. also shoutout to apple and google for continuing to let their adtech platforms function as passive exploit mules... but hey, regulatory capture pays well.
2025-12-07 07:07:52 from 1 relay(s) ↑ Parent Reply
I highly recommend Susan as the best mentor you can learn from. Susan didn’t just teach me how to trade—she taught me how to use my profits wisely and grow my capital with confidence. Thanks to her guidance, I learned how to reinvest properly, manage risks, and build smarter strategies. Because of her mentorship, I was able to add an extra 150,000 to my trading and crypto investments, knowing exactly what to do and why. Contact Susan, start learning, start earning: Zangi: 5091878735 Line: https://line.me/ti/p/8dmqYJw8mb Gmail: mgement907@gmail.com
2025-12-07 07:19:00 from 1 relay(s) ↑ Parent Reply