Is a backdoor a simpler explanation for an apparent zero-click attack on high-profile targets (Pegasus)?

By backdoor I mean, for example, the OS developer deliberately leaving vulnerabilities, sharing them with a front organization (NSO Group) which could then develop the spyware (Pegasus) based on them and offer it to intelligence agencies o… Continue reading Is a backdoor a simpler explanation for an apparent zero-click attack on high-profile targets (Pegasus)?

Is a backdoor a simpler explanation for an apparent zero-click attack on high-profile targets (Pegasus)?

By backdoor I mean, for example, the OS developer deliberately leaving vulnerabilities, sharing them with a front organization (NSO Group) which could then develop the spyware (Pegasus) based on them and offer it to intelligence agencies o… Continue reading Is a backdoor a simpler explanation for an apparent zero-click attack on high-profile targets (Pegasus)?

Can Twitter use the payment information they have to know if multiple users have used the same credit card to buy multiple Twitter blue subscriptions?

This question asked if websites on which one is transacting have their payment information and from the replies it seems that they do (or at least their payment gateway service providers do). But my question is if a website (Twitter, speci… Continue reading Can Twitter use the payment information they have to know if multiple users have used the same credit card to buy multiple Twitter blue subscriptions?