Click Here cover image

52. SPECIAL FEATURE: Shoot the Messenger: Espionage, Murder & Pegasus Spyware

Click Here

00:00

Reverse Engineering Pegasus on a Phone

Pegasus can bypass any encryption because it uses a loophole in phone software to be an incognito but active parasite. When Pegasus is on a phone, Bill can see the evidence of it right away. You can turn on the microphone to snoop in on conversations happening around the device. It was full access to the phone. And there was something else. They knew from the types of text messages she'd been sent which had already been identified as Pegasus bait that they had tried to target her several times.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app