foxkurdisssh buy the court documents at Krimfup, check page 34.
No, I am not going to buy a court document. I am asking you to provide a quote here. It is you who are making a very radical claim here about an actively exploited vulnerability in GrapheneOS, so I am asking you to provide a quote of what made you believe there is such a vulnerability.
Toiletterider They have all the evidence from chats (signal, whatsapp, telegram, snapchat, whatever really).
But - cannot break the passwords or codes to access the phones content. As stated in FUPs.
If they do have Signal chats and WhatsApp chats, without having obtained them from the other party, and without having been able to unlock the seized phone, I agree, that would indicate a likely vulnerability that is being actively exploited. However, I did not see that any of the above referenced court documents indicating this.
Toiletterider So, how do they have access to it remotely...?
I have not seen any evidence or even indication that they have accessed it remotely. I am not ruling out the possibility, and if this is happening and there is a vulnerability, this is something we would very much want to patch immediately to stop this from happening. So that is why I am asking to provide references to anything that indicate this is happening. But no such references has been provided.
Toiletterider By simple logical conclusion, there has to be a trojan or similar attack.
Someone I know got arrested by the police recently. Did you know what was the first thing he did? He unlocked all his devices for the police, and handed over all passwords for all his online accounts. He did this voluntarily, because he knew they had damning evidence against him, and he wanted a lower sentence by being cooperative.
Toiletterider Read the FUPs and make your own conclusion.
I will recognize a security vulnerability when I see it. In fact, I have reported several security vulnerabilities to several open source projects, including GrapheneOS. This far there is a lot of speculations in this thread, but nothing that actually looks like an existing exploit or vulnerability, just fear mongering.
I would very much prefer if people in this thread were helpful, but that is not happening. All I get is "buy this document", "read the document yourself" and similar statements. That looks malicious to me, not coming from someone who wants to be helpful and see a stop to the alleged hacks, but from someone who wants to spread unbased fear and stall any attempts to bring clarity.