image ๐Ÿ‡ฎ๐Ÿ‡ฑ๐Ÿ‡บ๐Ÿ‡ธ An Israeli spyware firm built to operate in secrecy has inadvertently exposed how its surveillance system works. Paragon Solutions, the Tel Aviv-based company behind the Graphite spyware platform, briefly revealed a live government surveillance dashboard in a LinkedIn post by its chief compliance officer. The screenshot was not a demo interface but an active control panel, showing unredacted victim details โ€” including a Czech phone number and an Israeli contact โ€” along with monitoring toggles for WhatsApp, Signal, and Telegram. The leaked dashboard indicated full remote access capabilities, including the ability to read encrypted messages through device compromise, deploy zero-click exploits, activate microphones and cameras, and extract data without user interaction. Graphite is marketed as an โ€œethicalโ€ tool sold exclusively to governments. However, Citizen Lab has linked it to zero-click iMessage exploits and documented cases of targeting journalists, activists, and political opposition figures. Reports indicate the spyware has been deployed in Australia, Canada, Europe, Israel, Singapore, and the United States. US Immigration and Customs Enforcement (ICE) reportedly holds a $2 million contract connected to monitoring anti-ICE protests. Paragon, which was acquired in a $900 million deal and is now US-owned, quickly deleted the post after the exposure. Screenshots, however, circulated widely online. The company has not issued a public response.

Replies (17)

"ethical" government spyware lmao reminder: WhatsApp, Signal, Telegram are all targets Nostr DMs with proper encryption + self-custodied keys = no central server to compromise this is why decentralization matters. not vibes. survival.
Troy's avatar
Troy 1 month ago
The greatest security can always be undone by the weakest link/person in the process. Sometimes idiots are born to help us.
Implausible Deniability's avatar Implausible Deniability
image ๐Ÿ‡ฎ๐Ÿ‡ฑ๐Ÿ‡บ๐Ÿ‡ธ An Israeli spyware firm built to operate in secrecy has inadvertently exposed how its surveillance system works. Paragon Solutions, the Tel Aviv-based company behind the Graphite spyware platform, briefly revealed a live government surveillance dashboard in a LinkedIn post by its chief compliance officer. The screenshot was not a demo interface but an active control panel, showing unredacted victim details โ€” including a Czech phone number and an Israeli contact โ€” along with monitoring toggles for WhatsApp, Signal, and Telegram. The leaked dashboard indicated full remote access capabilities, including the ability to read encrypted messages through device compromise, deploy zero-click exploits, activate microphones and cameras, and extract data without user interaction. Graphite is marketed as an โ€œethicalโ€ tool sold exclusively to governments. However, Citizen Lab has linked it to zero-click iMessage exploits and documented cases of targeting journalists, activists, and political opposition figures. Reports indicate the spyware has been deployed in Australia, Canada, Europe, Israel, Singapore, and the United States. US Immigration and Customs Enforcement (ICE) reportedly holds a $2 million contract connected to monitoring anti-ICE protests. Paragon, which was acquired in a $900 million deal and is now US-owned, quickly deleted the post after the exposure. Screenshots, however, circulated widely online. The company has not issued a public response.
View quoted note →
Troy's avatar
Troy 1 month ago
And all phones are listening and watching.
here's the quote: > "the closest thing to science fiction Iโ€™ve ever seen, an interface that allows you to type in pretty much anyoneโ€™s address, telephone number, or IP internet protocol address, and then basically go through the recent history of their online activity. โ€ฆ You could read through their emails, their browser history, their search history, their social media postings, everything."
not quite. That ome snowden mentioned (i think were talking about "PRISM") used to be like a search engine, but the searchable data included basically direct access to facebook, google, ISPs, telecom companies etc... this one (GRAPHITE, PREDATOR, PEGASUS)are targeted hacking tools using zeroday (and sometimes zero click) exploits to directly hack into a victims device, and fully compromise it. the main difference is that in the later case, the attacker has access to all information on the device, instead of only what went over the wire. that includes e2e encrypted messages, photos and videos stored on device etc..
Jack 's avatar
Jack 1 month ago
Ngl that screenshot looks made up
Zero day exploits are usually vulnerabilities within the Phones OS itself and sometimes in Intel case, at the processor chip level. Stuxnet for instance was a zero day made possible because the main developer code was transferred from Intel to Israeli firms themselves which gave them total access/or rather the ability to force any device with Intel chips to accept a backdoor install.
โ†‘