Anonymous ID: 95beda June 24, 2019, 3:36 p.m. No.6833527   🗄️.is 🔗kun

Pegasus Tool

 

In order to work outside of the government system, you will need to individually infect your targets phones.

Pegasus, created by the NSO Group in Israel, is one such tool.

Pegasus is only sold to government agencies with the intent to combat crime and terrorism.

Pegasus Tool reports usage data back to NSO Group.

Once a government agency gets their Pegasus Tool, they can target one of their own devices.

Capture the EXPLOIT, reverse engineer how it functions, discover what vulnerabilities it leverages.

Now they can produce their own Tool, outside of the NSO Groups access.

Infection can occur through links sent in emails or sms messages.

Once a phone is infected, Pegasus has complete control of the device.

Unfortunately, infecting one phone at a time is very time consuming.

You need a way to mass infect a large target group, targets based on your criteria.

 

Twitter As A Target

Any Social Media Platform Using Phone Verification

 

@Jack and Twitter

Why are select individuals silenced on Twitter, some restored?

Is this all being done with inside access?

Is @Jack a pederast?

Does @Jack produce secret twitter 'functionality' for criminal behavior?

Did someone document @Jack's criminal activity in order to blackmail and gain control over Twitter?

Was a Pegasus like Tool used as one method to document @Jacks activities?

How would gaining control over Twitter help to identify, locate, and use targeted Twitter users?

Twitter requires a phone number in order to verify an account.

If an individual gains control over Twitter, using a Pegasus like Tool, they can now target every user of Twitter through its phone verification database.

They can quickly go from targeting individual users to targeting large groups of users.

This method is not limited to Twitter, but any social media platform that utilizes cell phones as a verification system.