On quite a few news websites there’s a new hot topic how the Australian “Ghost” app got hacked by Interpol and has led to prevention of murders and resulted in a few arrests.
Is there any information out there on what security methods Ghost used and how it was exploited?
What? Like “I’lL mAkE mY oWn EnCrYpTiOn”?
The administrator (creator) aledgedly created the platform 9 years ago when he was 23…
Actually I’m thinking of Phantom Secure. They built phones to go along with their app services.