Lynda@lemmy.ml 2 years ago
If a device is compromised, the adversary can do whatever they want: screenshots, keyloggers, fork Signal and install their own client.
Lynda@lemmy.ml 2 years ago
If a device is compromised, the adversary can do whatever they want: screenshots, keyloggers, fork Signal and install their own client.