> "The reality is that there are a number of known surveillance vendors and bad actors in this space, but given the opaque nature of telecommunications signalling protocols, those vendors are able to operate without revealing exactly who they really are"
This pretty much summarizes the core problem of the whole mobile security field. You can only secure as far, as the next closed ecosystem is away. Which is not very far. Caused by the ongoing push & pull between the key players.
lashull•1h ago
This pretty much summarizes the core problem of the whole mobile security field. You can only secure as far, as the next closed ecosystem is away. Which is not very far. Caused by the ongoing push & pull between the key players.