forked from nyancrimew/maia.crimew.gay
im sptuid
This commit is contained in:
parent
fdd622d164
commit
62c5153c45
1 changed files with 2 additions and 2 deletions
|
@ -16,7 +16,7 @@ some of the most vile, somehow not illegal, types of businesses to exist. but to
|
||||||
|
|
||||||
## what is stalkerware
|
## what is stalkerware
|
||||||
|
|
||||||
stalkerware is an umbrella term for most privately, commerically available spyware, more specifically ones hidden from the target (spyware that doesnt hide its purpose (such as child monitoring software like life360) will be referred to as watchware in this series). it is also often referred to as spuseware due to the prevalence in use by controlling partners to "catch cheating partners", but i dislike this term because use of such software against children (or by employers against employees) is just as bad and abusive as against partners.
|
stalkerware is an umbrella term for most privately, commerically available spyware, more specifically ones hidden from the target (spyware that doesnt hide its purpose (such as child monitoring software like life360) will be referred to as watchware in this series). it is also often referred to as spouseware due to the prevalence in use by controlling partners to "catch cheating partners", but i dislike this term because use of such software against children (or by employers against employees) is just as bad and abusive as against partners.
|
||||||
|
|
||||||
stalkerware usually works by giving the spying person access to a dashboard where they can track all phone activity of a victim, be it phone calls, text messages, notifications, geolocation, their photos or anythign else you can imagine, as well as a mobile (or desktop) applcication. the client malware component usually either requires for the spying person to either have physical access to a device to install a client which hides itself upon finished setup, or sending their victim a link to a disguised application (such as a ringtone creator application) which then asks for an activation code also provided by the spy.
|
stalkerware usually works by giving the spying person access to a dashboard where they can track all phone activity of a victim, be it phone calls, text messages, notifications, geolocation, their photos or anythign else you can imagine, as well as a mobile (or desktop) applcication. the client malware component usually either requires for the spying person to either have physical access to a device to install a client which hides itself upon finished setup, or sending their victim a link to a disguised application (such as a ringtone creator application) which then asks for an activation code also provided by the spy.
|
||||||
|
|
||||||
|
@ -36,4 +36,4 @@ ok i feel like it should already just be clear from the previous section why sta
|
||||||
|
|
||||||
alright so, see point 5 above? yea that, i will be collecting stalkerware breaches sent to me, looking into companies myself, and blogging about them one by one. revealing (as far as possible) how unsecure they are, who's behind them, trying to get comment, and helping other journalists with stalkerware related reporting. two blog posts are already in the works, and if you have anything to contribute to potential reporting (vulns you find in stalkerware software, leaked data, investigations, insider info \[your identity will be protected], etc) or are a journalist looking to cover anything in this series in more detail, contact me \[contact page with an email address + pgp key will be up within the next few days, if you already have me on signal feel free to reach out now].
|
alright so, see point 5 above? yea that, i will be collecting stalkerware breaches sent to me, looking into companies myself, and blogging about them one by one. revealing (as far as possible) how unsecure they are, who's behind them, trying to get comment, and helping other journalists with stalkerware related reporting. two blog posts are already in the works, and if you have anything to contribute to potential reporting (vulns you find in stalkerware software, leaked data, investigations, insider info \[your identity will be protected], etc) or are a journalist looking to cover anything in this series in more detail, contact me \[contact page with an email address + pgp key will be up within the next few days, if you already have me on signal feel free to reach out now].
|
||||||
|
|
||||||
> note: [the EFF has also been doing really important work rooting out stalkerware for many years now](https://stopstalkerware.org/), which i have previously contributed to with other work, which i will not link due to it being linked to my deadname
|
> note: [the EFF has also been doing really important work rooting out stalkerware for many years now](https://stopstalkerware.org/) (cool website to learn even more about stalkerware too), which i have previously contributed to with other work, which i will not link due to it being linked to my deadname
|
Loading…
Reference in a new issue