
52. SPECIAL FEATURE: Shoot the Messenger: Espionage, Murder & Pegasus Spyware
Click Here
00:00
Reverse Engineering Pegasus on a Phone
Pegasus can bypass any encryption because it uses a loophole in phone software to be an incognito but active parasite. When Pegasus is on a phone, Bill can see the evidence of it right away. You can turn on the microphone to snoop in on conversations happening around the device. It was full access to the phone. And there was something else. They knew from the types of text messages she'd been sent which had already been identified as Pegasus bait that they had tried to target her several times.
Transcript
Play full episode