๐ฎ๐ฑ๐บ๐ธ An Israeli spyware firm built to operate in secrecy has inadvertently exposed how its surveillance system works.
Paragon Solutions, the Tel Aviv-based company behind the Graphite spyware platform, briefly revealed a live government surveillance dashboard in a LinkedIn post by its chief compliance officer.
The screenshot was not a demo interface but an active control panel, showing unredacted victim details โ including a Czech phone number and an Israeli contact โ along with monitoring toggles for WhatsApp, Signal, and Telegram.
The leaked dashboard indicated full remote access capabilities, including the ability to read encrypted messages through device compromise, deploy zero-click exploits, activate microphones and cameras, and extract data without user interaction.
Graphite is marketed as an โethicalโ tool sold exclusively to governments. However, Citizen Lab has linked it to zero-click iMessage exploits and documented cases of targeting journalists, activists, and political opposition figures. Reports indicate the spyware has been deployed in Australia, Canada, Europe, Israel, Singapore, and the United States. US Immigration and Customs Enforcement (ICE) reportedly holds a $2 million contract connected to monitoring anti-ICE protests.
Paragon, which was acquired in a $900 million deal and is now US-owned, quickly deleted the post after the exposure. Screenshots, however, circulated widely online. The company has not issued a public response.
๐ฎ๐ฑ๐บ๐ธ An Israeli spyware firm built to operate in secrecy has inadvertently exposed how its surveillance system works.
Paragon Solutions, the Tel Aviv-based company behind the Graphite spyware platform, briefly revealed a live government surveillance dashboard in a LinkedIn post by its chief compliance officer.
The screenshot was not a demo interface but an active control panel, showing unredacted victim details โ including a Czech phone number and an Israeli contact โ along with monitoring toggles for WhatsApp, Signal, and Telegram.
The leaked dashboard indicated full remote access capabilities, including the ability to read encrypted messages through device compromise, deploy zero-click exploits, activate microphones and cameras, and extract data without user interaction.
Graphite is marketed as an โethicalโ tool sold exclusively to governments. However, Citizen Lab has linked it to zero-click iMessage exploits and documented cases of targeting journalists, activists, and political opposition figures. Reports indicate the spyware has been deployed in Australia, Canada, Europe, Israel, Singapore, and the United States. US Immigration and Customs Enforcement (ICE) reportedly holds a $2 million contract connected to monitoring anti-ICE protests.
Paragon, which was acquired in a $900 million deal and is now US-owned, quickly deleted the post after the exposure. Screenshots, however, circulated widely online. The company has not issued a public response.
Login to reply
Replies (17)
Signal and telegram too..
Crazy how these people are allowed in polite society meanwhile ICE agents' families are being threatened with murder for simply arresting violent criminals that came to the US illegaly.
it is the same case of Roblox and the UK, they need to have criminals free to continue having excuses to impose more abusive laws.
Not sure i get the Roblox reference?
"ethical" government spyware
lmao
reminder: WhatsApp, Signal, Telegram are all targets
Nostr DMs with proper encryption + self-custodied keys = no central server to compromise
this is why decentralization matters. not vibes. survival.
Assume everything you do digitally is scraped and catalogued.
Everything.
๐งก๐๐ป๐ป
The greatest security can always be undone by the weakest link/person in the process. Sometimes idiots are born to help us.
๐ฎ๐ฑ๐บ๐ธ An Israeli spyware firm built to operate in secrecy has inadvertently exposed how its surveillance system works.
Paragon Solutions, the Tel Aviv-based company behind the Graphite spyware platform, briefly revealed a live government surveillance dashboard in a LinkedIn post by its chief compliance officer.
The screenshot was not a demo interface but an active control panel, showing unredacted victim details โ including a Czech phone number and an Israeli contact โ along with monitoring toggles for WhatsApp, Signal, and Telegram.
The leaked dashboard indicated full remote access capabilities, including the ability to read encrypted messages through device compromise, deploy zero-click exploits, activate microphones and cameras, and extract data without user interaction.
Graphite is marketed as an โethicalโ tool sold exclusively to governments. However, Citizen Lab has linked it to zero-click iMessage exploits and documented cases of targeting journalists, activists, and political opposition figures. Reports indicate the spyware has been deployed in Australia, Canada, Europe, Israel, Singapore, and the United States. US Immigration and Customs Enforcement (ICE) reportedly holds a $2 million contract connected to monitoring anti-ICE protests.
Paragon, which was acquired in a $900 million deal and is now US-owned, quickly deleted the post after the exposure. Screenshots, however, circulated widely online. The company has not issued a public response.And all phones are listening and watching.
2026 is the year where everything we have been warned about ... is revealed
Isn't this what Snowden wrote about in Permanent Record?
something about "an interface out of science fiction, where a person's device history and activity can be monitored, including sometimes realtime web browser activity"
here's the quote:
> "the closest thing to science fiction Iโve ever seen, an interface that allows you to type in pretty much anyoneโs address, telephone number, or IP internet protocol address, and then basically go through the recent history of their online activity. โฆ You could read through their emails, their browser history, their search history, their social media postings, everything."
not quite.
That ome snowden mentioned (i think were talking about "PRISM") used to be like a search engine, but the searchable data included basically direct access to facebook, google, ISPs, telecom companies etc...
this one (GRAPHITE, PREDATOR, PEGASUS)are targeted hacking tools using zeroday (and sometimes zero click) exploits to directly hack into a victims device, and fully compromise it.
the main difference is that in the later case, the attacker has access to all information on the device, instead of only what went over the wire.
that includes e2e encrypted messages, photos and videos stored on device etc..
Ngl that screenshot looks made up
As I understand it the company used zero day viruses through is to do this
Zero day viruses are installed on victim device
Zero day exploits are usually vulnerabilities within the Phones OS itself and sometimes in Intel case, at the processor chip level. Stuxnet for instance was a zero day made possible because the main developer code was transferred from Intel to Israeli firms themselves which gave them total access/or rather the ability to force any device with Intel chips to accept a backdoor install.
wow i didn't know about this. Horrific. Thank you for sharing.