minus-squarebndkt@lemm.eetoPrivacy@lemmy.ml•Austrian government agrees on plan to allow monitoring of secure messaginglinkfedilinkEnglisharrow-up2·4 days agoYou just have to infiltrate one end, e.g. the smartphone of one party linkfedilink
minus-squarebndkt@lemm.eetoPrivacy@lemmy.ml•Austrian government agrees on plan to allow monitoring of secure messaginglinkfedilinkEnglisharrow-up2·4 days agoProbably by infiltrating the end device using something like NSO linkfedilink
You just have to infiltrate one end, e.g. the smartphone of one party