Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Hacker used Phantom memory...
#11
None of this sounds even vaguely true. While I'm sure it is theoretically possible to use the bluetooth or wifi of your Phantom network as attack vectors via a hitherto unknown exploit, the effort and costs involved would require a very valuable target, and there would be much easier ways to run this attack.

At the end of this the result was, what - some files appeared? You reset the speaker and now suddenly you feel safe?

If you'd really been hacked with this level of sophistication, a root kit would have been installed and I wouldn't trust your computer at all without formatting it entirely. Even then, all bets are off.

Without any actual evidence like examples of these hidden files and/or analysis of their network activity to diagnose which nefarious activities they were undertaking, this seems like (at best) a misunderstanding of how the app works.
Reply


Messages In This Thread
Hacker used Phantom memory... - by steenh - 03-Oct-2016, 10:49
RE: Hacker used Phantom memory... - by dmitrek - 03-Oct-2016, 10:52
RE: Hacker used Phantom memory... - by steenh - 03-Oct-2016, 11:38
RE: Hacker used Phantom memory... - by ragwo - 03-Oct-2016, 12:00
RE: Hacker used Phantom memory... - by steenh - 03-Oct-2016, 16:36
RE: Hacker used Phantom memory... - by ragwo - 03-Oct-2016, 16:47
RE: Hacker used Phantom memory... - by steenh - 03-Oct-2016, 16:52
RE: Hacker used Phantom memory... - by ragwo - 03-Oct-2016, 20:55
RE: Hacker used Phantom memory... - by booshtukka - 03-Oct-2016, 21:55
RE: Hacker used Phantom memory... - by steenh - 04-Oct-2016, 09:27
RE: Hacker used Phantom memory... - by dkoretz - 09-Oct-2016, 18:37

Forum Jump:


Users browsing this thread: 1 Guest(s)