⚡🚨🇮🇱 ALERT - Israeli spyware company Paragon Solutions accidentally revealed details of its Graphite spyware after a LinkedIn post by its chief compliance officer included a screenshot of the live control panel. The dashboard reportedly showed active tools to monitor targets via WhatsApp, Signal, and Telegram, including options for full remote device access. The leak appeared to confirm Graphite can: ➥ Use zero-click exploits ➥ Read encrypted messages (via device compromise) ➥ Activate microphones/cameras ➥ Extract data without user interaction Paragon markets Graphite as an “ethical” government tool, but it has previously been linked to surveillance of journalists and civil society members. The company quickly deleted the post, but screenshots spread widely. image

Replies (6)

Default avatar
G Force G 2 months ago
I wonder if the backdoor they use is baked into apps like telegram and whatsapp. That would make sense based on the fact that these companies are "Corporate partners" of five eyes.
AnalBleachBurns's avatar
AnalBleachBurns 2 months ago
Fuck this I'm getting a pixel and switching to graphene the second I get my tax return
I'm confident you won't regret it. Make sure to use @Zapstore for installing apps instead of Google Play. If you need any apps that require Google Play Services, then create a second "normie" profile exclusively for those (maps, banking, etc.) and enable @GrapheneOS Sandboxed Google Play Services on that profile. GrapheneOS is unbelievably good software. Micay is on the level of Torvalds, IMO. The GrapheneOS crew's level of technical expertise (both in software and hardware) is unmatched in the open source community (with maybe a few rare exceptions).