How common are these things? Are we talking exclusive to dissidents and journalists or can some creepshow from anywhere download one off the dark web and use it on anyone he likes?Someone I know thinks their device may have been infected just from using a compromised WiFi network. It's an android phone, but she feels her every action on that phone has been watched ever since. She only connected to that network for an hour or so. How likely is this?
>>101577115zero-click attack is some zoomer shit, we used to call them computer worms
>>101577115You're not going to get any help here.2 reasons1The people who use this kind of software are almost always sociopaths. It's in their interests to keep it secret so they can continue their activities. It's usually financial or sexual. Put bluntly, they are evil. We can only hope they'll get what's coming to them in some divine justice because current law enforcement is incredibly impotent. And 2People who refuse to accept that it's possible to be compromised in such a way. MY CAMERAS AND MICROPHONES I WILLINGLY PUT IN MY HOME ARE WATCHING AND LISTENING TO ME AND BROADCASTING TO WEIRDOS ACROSS THE WORLD? NO!!!