Forum Thread: Question Android hacking

" Iwould use a military grade C encryption tool. It would involve me pinging the cell remotely and using a array of malware encrypted texts, bug infested cell transmissions and Geo-location acces, which would then spill to creating a background access into the target device as you can tell this is not a easy decryption process. In a bid to achieve excellence i would require your attention on time."

I am talking to proclaimed hacker about hacking android so replied me with this answer ... so is it really possible?

Never Miss a Hacking or Security Guide

Get new Null Byte guides every week.

Be the First to Respond

Share Your Thoughts

  • Hot
  • Active