Nemeski to [email protected]English • 5 months agoShopping app Temu is “dangerous malware,” spying on your texts, lawsuit claimsarstechnica.comexternal-linkmessage-square237fedilinkarrow-up1880arrow-down123cross-posted to: worldnews[email protected]technology
arrow-up1857arrow-down1external-linkShopping app Temu is “dangerous malware,” spying on your texts, lawsuit claimsarstechnica.comNemeski to [email protected]English • 5 months agomessage-square237fedilinkcross-posted to: worldnews[email protected]technology
minus-square@[email protected]linkfedilinkEnglish14•edit-25 months agoThe claim is they completely bypass all Android and iOS security is pretty unbelievable. If so then the real discussion is how these zero day exploits are just sitting around. EDIT: It seems the focus is on Android but all the information is nonsensical, like AI generated buzzword bingo.
minus-square@[email protected]linkfedilinkEnglish5•5 months agoI’m not seeing too many buzzwords here https://grizzlyreports.com/we-believe-pdd-is-a-dying-fraudulent-company-and-its-shopping-app-temu-is-cleverly-hidden-spyware-that-poses-an-urgent-security-threat-to-u-s-national-interests/
minus-square@[email protected]linkfedilinkEnglish5•edit-25 months agoThat source looks better indeed. Ars quotes nonsense like “bypasses the security” and “exploit the user”. Those terms have meaning and they aren’t applicable here. At the end though they do say things like is able to hack your phone from the moment you install the app Without any credible evidence.
The claim is they completely bypass all Android and iOS security is pretty unbelievable.
If so then the real discussion is how these zero day exploits are just sitting around.
EDIT: It seems the focus is on Android but all the information is nonsensical, like AI generated buzzword bingo.
I’m not seeing too many buzzwords here
https://grizzlyreports.com/we-believe-pdd-is-a-dying-fraudulent-company-and-its-shopping-app-temu-is-cleverly-hidden-spyware-that-poses-an-urgent-security-threat-to-u-s-national-interests/
That source looks better indeed.
Ars quotes nonsense like “bypasses the security” and “exploit the user”.
Those terms have meaning and they aren’t applicable here.
At the end though they do say things like
Without any credible evidence.