Comment on

Lynda@lemmy.ml ⁨2⁩ ⁨years⁩ ago

If a device is compromised, the adversary can do whatever they want: screenshots, keyloggers, fork Signal and install their own client.

source
Sort:hotnewtop