They have high side computers they referenced, those are specially vetted. These phones shouldn’t have had sensitive info on them. If the operating system or an app had a screen recorder or key logger, you’d have a leak, even if the encryption is secure. Plus there’s the physical vulnerability of people seeing it in public or losing the phone.
They have high side computers they referenced, those are specially vetted. These phones shouldn’t have had sensitive info on them. If the operating system or an app had a screen recorder or key logger, you’d have a leak, even if the encryption is secure. Plus there’s the physical vulnerability of people seeing it in public or losing the phone.