Contents ...
udn網路城邦
Windows 10 end of support on 10/14/2025; block Hidden Network MAC address failed--以色列NSO集团间谍软件制造商Pegasus攻击 FB, Apple iphone,Text messages.. 更新 10/19/2025
2025/10/16 08:19
瀏覽30
迴響0
推薦0
引用0
国安部:美女博主策反我境内100余名人员,大学生识破并举报2025-10-12 08:15:18 来源:观察者网
--10/12/2025 very good. recently also watched china made TV shows such as 密战, 暗战, 大宅门, 茶馆. especially 密战 mentioned 铱星电话, 电话NH病毒 cant call out and recive phone calling, 窃密装置硬盘, control PC, 电脑的摄像头 and HD. ie exactly what i felt our 2 cell phones, 2PCs suffering except i did disable 电脑摄像头.

i would say such 窃密 didnt stop but more serious. not only target at certain high tech fields but people such as 学生. i hope more china young kids including 留学生 review 密战-like china TV shows. because you may already be target at.

10/12/2025 i used blue tape with a tiny paper covered 电脑摄像头 because disabled wont stop hacker thru it.

searched [disabled pc camera hacker still can thru it stealing screen informations?]Yes, a hacker can still steal screen information even if your PC camera is disabled, as screen capture is a separate function from your webcam . by gaining unauthorized remote access to your computer...

secands earlier tried to email spouse that psycho thief returned a bag with blue tape and clear tapes and i put behind my sofa, the blue tape gone again. spouse wont believe after disabled 电脑摄像头 the hacker still can thru it stealing screen informations. so i tried to email to him by searched the result. but the email account suddenly got 3 message as: Windows 10 end of support on 10/14/2025; Watch DRM content on Firefox...; another later disappeared .

click [Watch DRM..] DRM is technology that enables online video and audio services....then popped up [Gah. your tab just crashed. we can help!..]

--it looks like scam so searched [is it scam ...]message.. can occur in Mozilla Firefox . However, scammers often imitate this and other browser alerts to trick you into calling a fake tech support number or installing malware.

the question is my pc was factory upgraded to win11, Windows 10 end on 10/14/2025 shouldnt impact my pc. and cant see DRM has any related to my email account which logged in clicked composer but cant type and like it was totally dead. i can imaging from now on many bad symptions happen or firefox forced me to update from current 143.0.1 to 143.0.4 which i have no desire as thru horrible 143.0.1 bugs. other tabs still normal. later got trouble too. cant but close firefox and restart.

10/13/2025 i am pretty sure windows settings Netwointernetrkthat Hidden Network and internet , Wi-Fi, Show available networks the Hidden Network stick to my router

searched and tried cmd with administrator typed as:
C:\Users\my-user-name>arp -a
listing 6 ip-address attached to my router

to verify what are those 6 ip-address by typed as :
C:\Users\my-user-name>nslookup ip-address
it turned out Name: igmp.mcast.net, mdns.mcast.net, PS broadcast related
3 are Non-existent domain, and xxx.in-addr.arpa PS a domain name used for reverse DNS lookups of the broadcast address.

searched [2 users connected to router if disable mu-mimo will cause any side effect?]
When only two users are connected to a router, disabling MU-MIMO will have
no noticeable negative side effects and may even provide a minor performance benefit for those individual devices. This is because MU-MIMO is designed to manage congestion in networks with many simultaneously connected devices, and with only two users, there is no congestion to manage.

10/13/2025 Gateway > Connection > Wi-Fi > 5 GHz Radio MU-MIMI enabled set disabled

to me the less functions enabled the best. i dont want use any new functions provided by MS, ISP, router company... the simple the better because in usa very lack of professional designers and wont be responsible or admit they made mistakes.

i tried very hard to solve Hidden Network attached my router but original one Hidden Network became duplicate Hidden Network. the new one showed : open other people might be able to see info you send over this network. the original one is Secured.

Gateway > Connection > Wi-Fi>MAC Filtering
Allow --> Allow All which can see myself and others network names except [Hidden Network]

C:\Users\my-user-name>netsh wlan show networks mode=bssid PS copypaste which showed SSID n : network name (device name) or blank (hidden network); SSID m : MAC address

Gateway > Connection > Wi-Fi>MAC Filtering
Allow All --> Deny PS to blocade unknown [Hidden Netword] bssid by Manually-Added Wi-Fi Devices device name typed Hidden Network or network name (suspicious not yours)

MAC address : (ie SSID m) MAC address then click add and SAVE FILTER SETTINGS

Repeatedly netsh and ADD to MAC Filtering until [Hidden Network] dropped down as many as possible till cant add to MAC Filtering that means whatever repeated MAC address in MAC Filtering means the hacker uses virtual MAC address cant be blocked. there is no other way but keep monitoring by windows settings, network and internet, wifi, show available network
---------------------------
just found my iphone cant receive phone calling again that scheduled appointment coming and clinic kept contact me 6/10-10/10. the sound test is working but didnt ring at all. i used spouse iphone called my iphone proved didnt receive, didnt ring. but can call spouse iphone.

searched [airplane mode off, wifi off, recently if turned off celluar cant receive others calling but can call out why?] cellular network not connect.

searched [Traditional calls are made over your cellular network since 10/6/2025?] not knowing what AI answear talking about.

in the end by searching [airplane mode off, wifi off, recently if turned off celluar cant receive others calling but can call out why ?] got: iphone Settings, Phone, Wi-Fi Calling then select Wi-Fi calling on this iPhone turned on. problem solved.

10/13/2025 searched [hidden network has 13 BSSID what does it mean ?]

A hidden network with 13 Basic Service Set Identifiers (BSSIDs) means a single wireless network is being broadcast by multiple virtual access points, likely for a large corporate, campus, or public Wi-Fi deployment

. Each BSSID is the unique MAC address of a distinct virtual access point that shares the same network name (SSID).

This is a very advanced and high-density network setup, not a typical home network.

Why a single network has multiple BSSIDs

For network efficiency: Many modern Wi-Fi networks broadcast multiple BSSIDs from a single physical access point (AP). This technique, called Multiple BSSID (MBSSID), allows a network to support different service needs (e.g., employee network, guest network) more efficiently. In Wi-Fi 6E, this consolidation is mandatory to improve spectrum efficiency.

For seamless roaming: In large environments like offices, hospitals, or public venues, multiple physical access points are deployed across different locations to extend coverage. These APs are all configured with the same network name (SSID), but each broadcasts its own unique BSSID. This enables your device to seamlessly roam from one AP to another as you move, ensuring a stable connection.

For multiple virtual networks: A single physical access point can broadcast multiple virtual networks (VAPs), each with its own BSSID. This allows network administrators to create separate, logical networks on the same physical infrastructure, which is useful for:

Segmenting user traffic, such as creating a guest network and a more secure, internal staff network.

Prioritizing different types of traffic, such as separating low-priority internet browsing from mission-critical applications.

Because the SSID is hidden: Hiding the Service Set Identifier (the network name you see) does not make the network invisible. When a device connects to a hidden network, it must already know the exact SSID. The networks multiple BSSIDs are still essential for the device to connect to the correct access point. This configuration offers little to no security benefit but does increase network discovery time for a client.

What 13 BSSIDs means for you

If youre using a Wi-Fi scanning tool that shows a hidden network with 13 BSSIDs, it indicates the presence of a robust, high-density network, not a threat.
ps

Enterprise-grade network: It is highly likely you are in the vicinity of a sophisticated corporate, institutional, or large public Wi-Fi network.

Normal network management: The network is not a threat. The configuration is a common way for network administrators to manage multiple virtual SSIDs and access points efficiently.

A scanners perspective: From your Wi-Fi scanners perspective, it is simply reporting every unique hardware identifier it is detecting in its radio range.

[hidden network has 13 BSSID what does it mean, all cant be blocked by MAC filtering ?] MAC addresses can be spoofed: A malicious actor can easily change their devices MAC address to mimic a legitimate one on your allow list. It is not an effective security measure on its own. -- this is what i saw after blocked MAC address, next time became almost same but one was changed or added new such as 4a:bd:ce:d1:d8:0a , 4a:bd:ce:d1:d8:0b added new. if it is not scam group why it were blocked until all cant be blocked by very advanced and high-density network tech ?

The filter isnt per-SSID: On many routers, MAC filters apply globally, not to a specific SSID. If you tried to block the BSSIDs of the "hidden network," you could end up blocking your own legitimate access points .

--router Admin did have limit of numbers allowed to be blocked. we only have 2 PCs, and most time disconnect WiFi : 2 iPhones, 1 Roku with TV. Have no worry block ours legitimate access points.

searched [i can block hidden network SSIDs, does it mean those SSIDs attached my router illegally?] does not automatically mean that it was attached to your router illegally. This is a common misconception about how Wi-Fi works.

Your ability to see and block a "hidden network" SSID The hidden network you see is likely a separate, legitimate Wi-Fi network from a neighboring router, not a rogue device on your network.

--Really? i bet our neigbourhood as residents no one can overnight suddenly owns 13 SSIDs on 10/13/2025 (earlier -10/12/2025 original was 4 SSIDs) . if me-type can so easy block hidden network SSIDs then it already blocked my network forever. why i did this because unknown ghosts daily frequently control my PC, iphone especially stealing and switched my data files versions just as malcious hacker does. i did search and AI answear daily frequently auto switched file expllorer with different data files caused by hackers not MS, file explorer updating. How about MS and file explorer honestly tell users when and why auto swiched users data files different time versions by their illegal copy users different time data files versions and where they store, MS made OneDrive ? if MS can in public admit then i would stop block suspicious network names especially [Hidden Network]. i did suspect whether related to our ISP company did very weird things to their client.

ps C:\Users\my-user-name> ipconfig /all which list all related to your devices MAC addresses.

ps to verify suspicious MAC addresses what are the devices maker by searched [what is MAC address xx:xx:xx:xx:xx:xx] or thru [MAC Address Lookup] , both show those vendors but not [in a block designated for "private" or locally administered use]. Private MAC addresses are often used in virtual environments like virtual machines or containers, or in specialized networking hardware. They are used to avoid conflicts with universally administered MAC addresses.
Examples of locally administered addresses(ISP company ? correct: An ISP has no control over the devices on your private, internal network): second hexadecimal digits correspond to locally administered addresses

Universally Administered Address (UAA): The bit is set to 0 ie 0(0000) 4 (0100) 2nd bit is 0 PS not so sure due to no example

searched [what is MAC address example for a block designated for UAA use?] 00-1A-2B-3C-4D-5E: 00(Hex) = 00000000(binary) the second-least significant bit (the U/L bit) is the seventh bit from the left. the seventh bit is 0

Locally Administered Address (LAA):The bit is set to 1 ie 2(0010) 6 (0110) A (1010) E (1110) 2nd bit is 1

x2-xx-xx-xx-xx-xx ; x6-xx-xx-xx-xx-xx ; xA-xx-xx-xx-xx-xx ; xE-xx-xx-xx-xx-xx
if you cant get answear from searched.


my experiences : prefix 4a:bd:ce NJ Vendor: Avaya, Inc; fa:d2:ac Apple iphone... made in TW Hon Hai.

most neighbourhood can be easy found their device makers but suspicious cant as :

SSID 2 : blank (ie Hidden Network) BSSID 1 : 72:13:01:43:96:06 ???

SSID 3 : Marianita77 BSSID 1 : 72:13:01:43:96:01 ???

SSID 8 : DIRECT-QU-VIZIOTV BSSID 1 : 02:6b:9e:83:82:af *** ???

ps searched [without pay can user be itself administrator to assgn LAA ?] As a standard user, you cannot grant yourself local administrator rights on a computer without having administrative credentials. How to become a local administrator To be assigned local administrator rights, you must have an existing administrator on the computer perform the action.

If you have access to an administrator account, you can follow these steps: Sign in to the computer with the existing administrator account. Go to Settings > Accounts > Family & other users. Select your user name and click Change account type. Change the account type to Administrator and click OK. Log out of the administrator account and sign in with your account to access the new permissions. If you do not know the administrator password and are using a personal computer, you will need to perform a password reset or reinstall Windows. searched [user with administrator account can assign LAA, any side effect after change MAC address ?] Technical side effects MAC address conflicts: If the LAA you assign is already in use by another device on the same local network, it will cause an address conflict. This can disrupt network communication for both devices and lead to intermittent connectivity or a complete loss of network access.

Loss of network-dependent services: Some network services rely on a consistent MAC address to function correctly. These can include:

Static DHCP assignments: If a DHCP server is configured to always assign a specific IP address to a device based on its MAC address, changing the MAC will cause the server to assign a different IP address.

Network Access Control (NAC): Security systems that grant network access based on device identity may revoke access when they no longer recognize the MAC address.

Break in network continuity: A minor but common effect is the temporary interruption of network connectivity while the network switch updates its MAC address table to reflect the change. This can cause a brief service disruption.

--me-type normal user better give up.

10/15/2025 searched [did isp company related to hidden network network?] this time got as:

Yes, Internet Service Providers (ISPs) can be related to "hidden" networks, most often through a public Wi-Fi hotspot feature built into their customer-provided routers. They can also be involved if your home network is configured to be hidden, especially if the ISP controls the devices firmware. ie renting a modem or router from your ISP....

--it should not our case that we own our router/modem not rent. however not surprised if ISP does conntrol our router/modem. my question is today Hidden Network has 11 BSSID and cause network very slowly, then spouse watched yutube broke. 10/14/2025 also WiFi broke for short time. 感情 we pay higher and higher $39.xx but poor connection quality for Hidden Network many BSSID to use our channel purpose?
--------------------------------------------
美国法院禁NSO攻击WhatsApp 惩罚性赔偿大幅降低 时间: 2025-10-18 17:21
【侨报讯】美国法院已下令以色列NSO集团(NSO Group Technologies Ltd)停止针对Meta平台(Meta Platforms Inc)的WhatsApp消息服务进行攻击。
据路透社报道,在周五(10月17日)公布的一份25页判决书中,美国地方法院法官菲利斯·汉密尔顿(Phyllis Hamilton)对NSO集团入侵WhatsApp的行为实施了永久禁令。WhatsApp是全球最广泛使用的通信平台之一。
汉密尔顿法官还大幅减少了NSO在近期陪审团审判中需向Meta支付的惩罚性赔偿金,将约1.67亿美元的赔偿降至400万美元。
这一禁令可能对NSO构成重大挑战。多年来,NSO一直被指控通过其旗舰黑客工具“Pegasus”协助侵犯人权。Pegasus利用常用软件中的漏洞进行监控,使WhatsApp成为其重要目标之一。
据判决书,NSO此前曾辩称,若禁止其针对WhatsApp采取行动,“将危及NSO的整个企业”并“迫使NSO破产”。
Meta高管对这一裁决表示庆祝。WhatsApp负责人威尔·卡斯卡特(Will Cathcart)在社交平台X上表示:“今天的裁决禁止间谍软件制造商NSO再次针对WhatsApp及我们的全球用户。我们赞赏这一裁决,这标志着历时六年的诉讼终于让NSO为其针对民间社会成员的行为承担责任。”
--Baidusearched [Meta] Meta美国互联网公司
‌基本信息‌:成立于2004年,原名Facebook,2021年更名Meta,总部位于加州门洛帕克,旗下拥有Facebook、Instagram、WhatsApp等社交平台
--Haaaa FB block my account twice cant tell me what did i violate the company rules, now came out 六年前以色列NSO集团间谍软件制造商 通过其黑客工具“Pegasus”利用常用软件中的漏洞进行监控 WhatsApp 及 their 的全球用户. does it include block my account twice ?

NSO长期坚持其产品用于打击严重犯罪和恐怖活动。该公司表示,对惩罚性赔偿减少97%表示欢迎,并称禁令并不适用于NSO的客户,“他们将继续使用公司的技术以协助公共安全保护。”
--who are NSO的客户, CIA, FBI, Hackers ?
searched [who are who are NSO clients who 侵犯人权 ?] NSO Groups clients are exclusively government agencies, including military, law enforcement, and intelligence services
. The company does not publicly disclose its customer list. However, leaks and investigations by media and human rights groups have revealed a list of likely clients. These clients are not limited to authoritarian regimes but also include democratic governments.
Based on investigations like the "Pegasus Project," likely NSO clients have included:

Middle East: Saudi Arabia, the United Arab Emirates, Bahrain, Qatar, and Morocco. NSOs spyware has reportedly been used against activists and dissidents异议者 in the region.
Mexico: Mexican government agencies were significant buyers, with investigations revealing that spyware was used against journalists, activists, and political opposition.
Europe: Hungary and France were identified in the leaked data, with French President Emmanuel Macron and Hungarian media figures among those selected for surveillance.
India: The phone numbers of hundreds of journalists, activists, and politicians appeared on the leaked list.
Other countries: NSO customers have also been identified in Azerbaijan, Kazakhstan, Rwanda, and Uganda.
--so none living in usa were victims of NSO 侵犯人权 clients ? usa has none became NSO clients ? how about Hackers or those exposed millions living in usa people on dark web sites ? why 20 years usa government still cant catch who behind dark web sites ?

NSOs stated policy vs. reported use
NSO Group maintains that it sells its technology only to vetted government clients for legitimate purposes, such as combating crime and terrorism. The company claims to conduct due diligence and has reportedly cut ties with clients found to have abused its technology.
However, human rights groups like Amnesty International and media reports have consistently documented the use of NSOs Pegasus spyware to target journalists, human rights defenders, political opponents, and businesspeople.
Consequences for NSO
Accusations of misuse have led to significant fallout for NSO Group:

The U.S. government placed NSO Group on its "entity list" in 2021, restricting business dealings with the company.
Legal challenges have been filed by companies like Meta (WhatsApp) and Apple.
--Waaa Aplle also sued NSO? did our 2 iphones been exposed in darke web and under controlled caused by NSO mystery 侵犯人权 clients too ?

In one legal case, NSO admitted to cutting off 10 customers because they abused its spyware间谍软件.

公司还表示,将对判决进行审查,并“相应决定下一步行动”。
据科技媒体TechCrunch早前报道,该公司最近被由好莱坞制片人罗伯特·西蒙兹(Robert Simonds)领导的集团收购。西蒙兹未立即回复电子邮件。 (编译
--why not tell who are their victims by using FB account, Apple iphone, so victims can together sue the bastard NSO ?

PS searched [how to detect Pegasus spyware in my PC , iphone ?] The best method to check for Pegasus spyware is using Amnesty Internationals Mobile Verification Toolkit (MVT), which requires technical expertise and a Mac or Linux computer. However, Pegasus is an advanced tool used for highly targeted attacks on high-profile figures, making an infection in an average users PC highly unlikely.
...............
searched [Pegasus spyware wont happen to PC ?] It is extremely unlikely for Pegasus spyware, developed by the Israeli NSO Group, to be used against a typical personal computer
. Pegasus was specifically designed to target and exploit vulnerabilities in mobile operating systems like Apples iOS and Googles Android.
--that mean i still have to find out who did to our PC.
................
Method 1: Using iMazing (easiest)
For a non-technical option that uses the MVT framework, you can use the iMazing app on a Mac or PC. The spyware detection tool is available for free within the application.
Download and install iMazing on your computer from the official website.
Connect your iPhone via a USB cable.
Launch iMazing and select your device from the sidebar.
Click "Detect Spyware" in the Actions panel.
Review the report. A positive detection will appear as "Possible infection detected." A clean scan will state "No signs of infection detected".
--searched [is imazing free detect Pegasus spyware on iphone ?] Yes, the iMazing spyware detection tool is free and can be used to scan an iPhone for traces of Pegasus spyware
. To use it, you download the iMazing application to your Mac or PC, connect your iPhone, select the "Detect Spyware" option, and follow the on-screen instructions.
How to use iMazings free spyware detector

Download and install the iMazing application on your Mac or Windows PC.
Connect your iPhone to your computer using a USB cable.
Launch iMazing and select your iPhone in the sidebar.
Navigate to the "Detect Spyware" tool in the Actions panel.
Follow the prompts to start the analysis. You may need to agree to license terms and check a box to download the latest STIX files.
Wait for the analysis to complete. iMazing will scan for indicators of a known spyware infection.
Review the analysis report provided by the tool.

Important considerations
What the scan does: The tool detects traces of known spyware, including Pegasus. It is not a real-time protection tool, but rather a forensic analysis tool.
Clean scan results: A "clean" result means no traces of the specific spyware iMazing is checking for were detected. It is not a guarantee that your device is 100% free of all potential threats.
Data is saved: The analysis creates a file that you can save to your computer.
Manual verification: To stay safe, you should also regularly check for other signs of malware, such as suspicious apps, unusual activity, and to keep your iOS updated.

searched [can uninstall imazing app 100%?] Yes, you can uninstall the iMazing app 100%
and completely remove its settings and cached data, but this requires several steps beyond a standard uninstall. Backups are not deleted during the uninstall process and must be removed separately.
Yes, you can uninstall the iMazing app 100%
and completely remove its settings and cached data, but this requires several steps beyond a standard uninstall. Backups are not deleted during the uninstall process and must be removed separately.
How to completely uninstall iMazing
On a Windows PC
Open iMazing and go to Settings > Preferences > General.
Select Reset to Factory Settings and quit the application.
Open the Control Panel and navigate to Programs > Programs and Features.
Find iMazing in the list, right-click it, and select Uninstall.
When prompted, confirm that you want to delete iMazings settings and cached data.
To ensure all residual files are removed, delete the following folders:
C:\Users\\AppData\Roaming\iMazing\
C:\Users\\AppData\Local\DigiDNA\
C:\ProgramData\DigiDNA\iMazing\
.....
or For a 100% clean uninstall on Windows
Reset to Factory Settings: Launch iMazing and go to Preferences. Select Reset to Factory Settings to remove your settings and cached data.
Run the uninstaller: Go to Control Panel > Programs > Programs and Features. Find iMazing, click "Uninstall", and agree to the prompts. During this process, you will be asked if you want to delete settings and cached data. Since you already reset the factory settings, you can confirm this.
Manually delete residual files: iMazing leaves files in various locations after the standard uninstall. To remove everything:
Backups: Delete your iMazing backups, which are typically found in C:\Users\\AppData\Roaming\iMazing\Backups.
Preferences: Delete the iMazing folder in C:\Users\\AppData\Roaming.
Application Data: Delete the DigiDNA folder from C:\Users\\AppData\Local.
Program Data: Delete the DigiDNA folder from C:\ProgramData.
.....
Remove paired devices: Uninstalling iMazing does not remove the pairing data for trusted devices. You may need to manually "forget" the computer on your iOS devices.
Clean the Windows Registry: To ensure a complete removal, you can use a registry cleaner or follow the manual steps provided in iMazings enterprise documentation. This step is only for advanced users.
Remove backups and device pairing
These steps are optional but necessary for a 100% complete removal.
Remove backups: The uninstaller does not delete your iOS backups. You must delete them manually from your computer. The default backup location is C:\Users\\AppData\Roaming\iMazing\Backups\ on Windows and ~/Library/Application Support/iMazing/Backups/ on Mac.
Remove pairing records: To unpair your devices from your computer, open iMazings Preferences > Devices and click Remove All Pairing Records. If you have already uninstalled iMazing, you can forget the device from iTunes/Finder

searched [none victims in usa suffered Pegasus spyware on iphones ?]
Despite the NSO Groups claim that Pegasus is not technically capable of hacking phones with U.S.-based phone numbers, U.S. citizens have been targeted with the spyware on iPhones
. This has occurred through both direct and indirect methods.
Confirmed instances of U.S. citizens and interests being targeted include:
Diplomats: In late 2021, Apple notified U.S. State Department employees that their iPhones had been hacked with Pegasus. The hacks, which affected officials focusing on or based in Uganda乌干达, were the most widespread known hacks of U.S. officials using Pegasus.
Journalists: Forensic analysis confirmed that New York Times journalist Ben Hubbard had his phone targeted by Pegasus twice in 2021. Palestinian-American journalist Daoud Kuttab was hacked multiple times between 2022 and 2023.
--not target at those sympathy on Palestinian supporters in usa ?

Human Rights Staff: A staff member of the Washington D.C.-based civil society organization Human Rights Watch (HRW) was targeted in 2023.
Indirect Targeting: Researchers have uncovered a technique called "off-center targeting" in which phones belonging to family, friends, or associates of a primary U.S. target are hacked instead. This allows attackers to access data from the U.S. citizens communications that are stored on the associates device.

Pegasuss capability to infect iPhones using "zero-click" exploits has made the attacks particularly insidious. These exploits can compromise a device without any action by the user, taking advantage of vulnerabilities in the iPhones software. The discovery of these attacks has prompted Apple to sue NSO Group and introduce stronger security measures for its devices.

searched [what is the status about Apple to sue NSO ?] Apple sued the NSO Group in November 2021 to prevent its Pegasus spyware from targeting Apple users and to hold the company accountable for abuses. The lawsuit sought to ban NSO Group from using Apples products and services, seek damages for legal violations, and provide new information on how NSOs spyware targets devices. Apple stated it has not seen any evidence of successful remote attacks on devices running iOS 15 and later, and urges all users to update their software.
--the question is iphone 6 plus disallowed to update to iOS 15 but final 12.5.7 . iphone 6 ES allowed update to 15.8.2 , why is that difference, both bought in the same year ? how do we know iphone 6 plus was earlier produced than iphone 6 ES? we thoght iphone 6 plus should be better than iphone 6 ES that has bigger screen.

searched [can imazing detect Pegasus spyware in iphone 6 plus and iphone 6 ES ?] Yes, iMazing can be used to scan an iPhone 6 Plus or iPhone 6 for signs of Pegasus spyware
. iMazings spyware detection feature is free to use and is based on the Mobile Verification Toolkit (MVT) developed by Amnesty Internationa

searched [except FB, apple iphone what else NSO spyware attacking at Palestine supporters ?] Key targets and methods used against Palestinian rights defenders include:
Android devices: The Pegasus software is designed to install covertly on both iOS and Android devices. Investigations into the targeting of Palestinian activists have found infections on a range of mobile devices.
Encrypted messaging apps: NSO Group has developed exploits for various messaging applications to enable surveillance of texts, calls, and files. This includes not only WhatsApp, which is owned by Meta (formerly Facebook), but also other services like Telegram.
Zero-click attacks: Pegasus can infiltrate a device with "zero-click" exploits that do not require any action from the target, such as clicking a malicious link.
Text messages: In some cases, the spyware was deployed by sending malicious links via text messages to infect a dev

serached [did NSO spyware calling Palestine supporters which pretend terrorists horrible scream ?] Based on available reports and investigations, there is no evidence to suggest that NSO Groups Pegasus spyware was used to generate fake "horrible screams" attributed to Palestinian supporters pretending to be terrorists ...
--long time ago i received a very weird phone called sounds like pretending to be terrorists screaming during Bush wars ? (definitely before 2013).
searched [did NSO spyware calling which pretend terrorists horrible scream during Bush wars ?] Based on available information, NSO Groups spyware, including Pegasus, was not involved in generating fake phone calls with "horrible terrorist screams" during the Bush administrations wars. This scenario is inconsistent with the companys founding date and known history.
serached [when did nso spyware come out ?] The NSO Group finalized the first version of its Pegasus spyware in 2011. It was first used by the Mexican government that same year.
While the spyware was developed in 2011, it did not become widely known until 2016, when it was publicly exposed after a failed attempt to hack the iPhone of a human rights activist.
--i would say earlier than 2011 before selling out, must have white mice as NSO spyware lab mice.

限會員,要發表迴響,請先登入