@[email protected] Understandable but people who don't have the time or skills to self host need someone to host those services in order to benefit from them, migrate away from #surveillanceware or just try out alternatives.

Look at what Murena has done with ecloud, their hosted Nextcloud solution for instance. Without it, it would be difficult to escape Google even on degoogled phones unless you can selfhost.

You can always have a limited free tier + donate a % of the payments to FOSS projects :)

An Israeli #surveillanceware company used the three Apple #zeroday vulnerabilities disclosed last week to develop an exploit chain for iPhones, and a Chrome zero-day to exploit Androids — all in a novel attack on Egyptian organizations☝️🤖

https://www.darkreading.com/dr-global/spyware-vendor-egyptian-orgs-ios-exploit-chain?utm_content=buffer586ed&utm_medium=social&utm_source=bufferapp.com&utm_campaign=buffer

Spyware Vendor Targets Egyptian Orgs With Rare iOS Exploit Chain

The Israeli company developed highly-targeted, mobile malware that would make any APT jealous.

Dark Reading

More activist #iPhones hacked using NSO Group advertised "terrorist & criminal" targeting. Part of an effort chilling #speech & silencing #HumanRights #activism.
#SurveillanceWare #iPhone #Bahrain #NSOgroup

https://www.cyberscoop.com/bahrain-nso-group-activists-ios/

Bahrain hacked activists' iPhones with NSO Group spyware, Citizen Lab says - CyberScoop

Government hackers used NSO Group surveillance technology to infiltrate the phones of nine Bahraini activists, according to a new report from Citizen Lab. The victims included a blogger, activist, members of political organization Waad and members of the Bahrain Center for Human Rights. Five of the targets identified by Citizen Lab, an internet watchdog from from the University of Toronto, were listed on a list of individuals obtained by Amnesty International as a part of its “Pegasus Project” investigation. The list is believed to comprise potential targets of NSO Group’s customers. Hackers used fake texts that linked out to malicious software as well as “zero-click” attacks, which do not require any user interaction. Researchers found that attackers successfully exploited the most recent versions of Apple iOS, circumventing protections introduced by the company in January to protect users against such attacks. Amnesty Tech has also reported zero-click exploits successfully exploiting iOS […]

CyberScoop
Going Down the Spyware Rabbit Hole with SilkBean Mobile Malware - An Android spyware attack was recently discovered that targeted the Uyghur ethnic minority group -... more: https://threatpost.com/going-down-the-spyware-rabbit-hole-with-silkbean-mobile-malware/157619/ #newsmakerinterviews #surveillanceware #mobilesecurity #carbonsteal #goldeneagle #podcasts #silkbean #android #spyware #uyghur #c2
Going Down the Spyware Rabbit Hole with SilkBean Mobile Malware

An Android spyware attack was recently discovered that targeted the Uyghur ethnic minority group – since 2013.

Threatpost - English - Global - threatpost.com
Android Spyware Tools Emerge in Widespread Surveillance Campaign - Four Android spyware tools have been used in a widespread APT campaign to spy on the Uyghur ethnic... more: https://threatpost.com/four-android-spyware-tools-surveillance-campaign/157063/ #dataexfiltration #surveillanceware #websecurity #carbonsteal #doubleagent #goldeneagle #silkbean #malware #android #spyware #uyghur #hacks #apt15 #mapt #apt
Android Spyware Tools Emerge in Widespread Surveillance Campaign

Four newly discovered Android spyware tools have come to light in a widespread APT campaign to spy on the Uyghur ethnic minority group.

Threatpost - English - Global - threatpost.com
Fake Skype, Signal Apps Used to Spread Surveillanceware - Threat groups are increasingly relying on trojanized apps pretending to be legitimate - such as Sk... more: https://threatpost.com/fake-skype-signal-apps-used-to-spread-surveillanceware/155053/ #surveillanceware #malware #spyware #videos #signal #trojan #skype #rsa
Threat Groups Using Fake Skype, Signal Apps to Spread Surveillanceware

Threat groups are increasingly relying on trojanized apps pretending to be legitimate – such as Skype or Signal – but are really spreading surveillanceware.

Threatpost - English - Global - threatpost.com