On quite a few news websites there’s a new hot topic how the Australian “Ghost” app got hacked by Interpol and has led to prevention of murders and resulted in a few arrests.
Is there any information out there on what security methods Ghost used and how it was exploited?
Isn’t that the one that they built on their own?
What? Like “I’lL mAkE mY oWn EnCrYpTiOn”?
The administrator (creator) aledgedly created the platform 9 years ago when he was 23…
Actually I’m thinking of Phantom Secure. They built phones to go along with their app services.
No, it was built by three-letter agencies and used to spy on cartels and others.