{"id":245134,"date":"2023-10-02T12:00:09","date_gmt":"2023-10-02T11:00:09","guid":{"rendered":"https:\/\/www.transcend.org\/tms\/?p=245134"},"modified":"2023-09-29T06:01:01","modified_gmt":"2023-09-29T05:01:01","slug":"revealed-israeli-cyber-firms-have-developed-an-insane-new-spyware-tool-no-defense-exists","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2023\/10\/revealed-israeli-cyber-firms-have-developed-an-insane-new-spyware-tool-no-defense-exists\/","title":{"rendered":"Revealed: Israeli Cyber Firms Have Developed an \u2018Insane\u2019 New Spyware Tool&#8211;No Defense Exists"},"content":{"rendered":"<blockquote><p><em>A Haaretz investigation reveals that Israeli cyber companies developed technology that exploits the advertising system at the heart of the online economy to monitor civilians, hack into their phones and computers, and spy on them. This terrifying capability, against which no defense currently exists, has already been sold to a nondemocratic country.<\/em><\/p><\/blockquote>\n<p><em>14 Sep 2023 &#8211; <\/em>We\u2019re being monitored. It\u2019s a universally acknowledged truth about this digital age. Technology firms and advertisers know almost everything about us: where we are, what we buy, which apps we download and how we use them, our search histories and past purchases, even our sexual orientation and what fetishes we\u2019re into. There\u2019s only one thing that advertisers don\u2019t or aren\u2019t supposed to have access to: our identity. The world of ads and the data behind them is meant to be anonymous.<\/p>\n<p style=\"text-align: center;\"><a target=\"_blank\" href=\"https:\/\/www.haaretz.com\/israel-news\/2023-09-14\/ty-article-magazine\/.highlight\/revealed-israeli-cyber-firms-developed-an-insane-new-spyware-tool-no-defense-exists\/0000018a-93cb-de77-a98f-ffdf2fb60000\" >CONTINUE READING <\/a>&#8211; <a href=\"https:\/\/www.haaretz.com\/israel-news\/2023-09-14\/ty-article-magazine\/.highlight\/revealed-israeli-cyber-firms-developed-an-insane-new-spyware-tool-no-defense-exists\/0000018a-93cb-de77-a98f-ffdf2fb60000\"  target=\"_blank\" rel=\"noopener\">haaretz.com<\/a><\/p>\n<p>___________________________________________<\/p>\n<p><a target=\"_blank\" href=\"http:\/\/www.defenddemocracy.press\/revealed-israeli-cyber-firms-have-developed-an-insane-new-spyware-tool-no-defense-exists\/\" >Go to Original &#8211; defenddemocracy.press<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>14 Sep 2023 &#8211; A Haaretz investigation reveals that Israeli cyber companies developed technology that exploits the advertising system to monitor civilians, hack into their phones and computers, and spy on them. This is a terrifying capability against which no defense currently exists.<\/p>\n","protected":false},"author":4,"featured_media":46549,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[216],"tags":[910,1009,550,1755,88,1277,1109,911,2841],"class_list":["post-245134","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology","tag-big-brother","tag-big-tech","tag-corruption","tag-data-protection","tag-israel","tag-privacy-rights","tag-spying","tag-surveillance","tag-tyranny"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/245134","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=245134"}],"version-history":[{"count":1,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/245134\/revisions"}],"predecessor-version":[{"id":245135,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/245134\/revisions\/245135"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media\/46549"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=245134"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=245134"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=245134"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}