![]() What's interesting here is that these files weren't actually GIFs, some of them were Adobe PSD files and others were PDFs. GIF files were present in the phone's iMessage app, and these had been received just before the device had been compromised. Citizen Lab extracted a backup of the device from iTunes, and began analyzing its contents.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |