Lynda
@Lynda@lemmy.ml
This is a remote user, information on this page may be incomplete. View at Source ↗
- Comment on 2 years ago:
If a device is compromised, the adversary can do whatever they want: screenshots, keyloggers, fork Signal and install their own client.