“Remember, when you say, ‘I want one iMessage exploit, it’s never one exploit,” he explained. “When an iPhone gets compromised with an iMessage exploit, they are using maybe three, four, five different exploits packaged in one. “There’s so many things that [NSO technicians] have to compromise with an iPhone that make it a lot more complicated. They need to compromise a number of [different] security measures that Apple put into place purposely to add layers of complications before you can successfully get complete ownership of the device. “The difficulty with compromising an iPhone is that you
...more

