Skip to main content


Israeli Spyware Firm Exposes Paragon Spyware Control Panel on LinkedIn


in reply to ☆ Yσɠƚԋσʂ ☆

Founded in 2019 in Israel, Paragon markets Graphite as sophisticated surveillance software, granting remote access to cell phones. Dubbed “mercenary spyware,” it infiltrates devices without user interaction, extracting messages from apps like WhatsApp and Signal, stored data, and live communications.
in reply to ☆ Yσɠƚԋσʂ ☆

this combined w other pieces of software like pegasus, it's clear that the isrealis have positioned themselves at the confluence of software & espionage in a similar way that taiwan positioned itself to exist at the center of the microelectronics world.
in reply to Ignoranceisnotabliss

like almost everything else, the only way to shut it down is to stop participating with it.

that means individuals either have to stop using linkedin & smartphones or perpetually stay informed about how to effectively counteract it.

in reply to eldavi

This phrase is related to the Zionism Occupation Government theory (alas, at this point it's barely a theory and is almost a fact)
This entry was edited (1 day ago)
in reply to Ignoranceisnotabliss

google has given me a nebulous idea of the theory, but it's not clear how it applies to isreali/us spycraft.
in reply to eldavi

Its more simple than you think, espionage = surveillance = control = power, while israel and its little pet is the heart of ZOG
in reply to eldavi

It's a neo-Nazi conspiracy theory. Give it no heed, they've been pushing it for decades. They misunderstand the complex power relationship between israel and the US and ascribe to powerful cabals that have operated for centuries and which have always been intertwined with Judaism when in fact Zionism really only captured Judaism in the past 50 years or so.
in reply to Majestic

of course google didn't mention anything at all about it have any relationship with nazism.

i need to find an alternative.

in reply to Ignoranceisnotabliss

in reply to Majestic

You literally told me to shut it down but stretched it to 200 words
in reply to Majestic

@davel@lemmy.ml

I was willing to give this user I'm replying to a crumb of benefit of the doubt but given they're using Nazi dog whistles and don't seem repentant about spreading Nazi conspiracy theories after being made aware of it (see their reply to me and their other posts) and instead seem to double down. I think action may be warranted under global rule 1 given it's unacceptable to be a Nazi or talking like one here.

Given they were also banned from the CTH sub on hexbear for the same behavior I think it's clear they're beyond saving in their desire to spread Nazism.

in reply to eldavi

There might actually be a direct relationship there as well. Taiwan being the chokepoint for western chip production puts them in a perfect position to insert backdoors into all western tech. There's a reason the US was freaking out over Huawei tech spreading in the west. The problem with it isn't that there's some Chinese malware in it, but rather that western agencies can't use it for spying.
in reply to ☆ Yσɠƚԋσʂ ☆

in reply to eldavi

in reply to ☆ Yσɠƚԋσʂ ☆

Why is the image from the moba game paragon by epic games. It has nothing to do with it, or are writers just lazy.
in reply to ☆ Yσɠƚԋσʂ ☆

How does a zero click hack even work? Let's assume the ISPs and phone companies are all willing to collaborate on an attack against you, your Signal chats are still local and encrypted, how do they get in?
in reply to iByteABit

Zero click hacks often find exploits in the victims OS, places where protocols run automatically. Stuff like Bluetooth device identification, wifi, sms protocols. I'm certainly no expert, but they are rare and highly coveted, and nation-states spend a lot of resources finding them. Ethical hackers also look for them, to notify the software/hardware creators and get them fixed.