Does anyone know how this even works? Is the technology for this already in place?

  • NightOwl
    link
    fedilink
    English
    arrow-up
    5
    ·
    1 year ago

    Yeah, if this can be done remotely then all smartphones by design are very insecure devices that shouldn’t be trusted to doing card transactions or entrusting with password management and two factor authentication…

    I wish they would go into more detail on the how of remote activation is made. Is it a law saying it is okay to do if it becomes possible? Is this through an exploit that was found and requires physical access to the device to initiate, or is it just a setting present on all phones by default.