Both were visible supporters of the pro-democracy movement.
8/ Also infected? Individuals with little public profile, but who played an important support role in protests, or fundraising.
A picture emerges: a #Pegasus operator seeking detailed information about the protest movement... in some cases guided by non public information.
9/ Who is behind the hacking? We @citizenlab aren't making a conclusive attribution.
But it's worth nothing that we've seen #Pegasus operators with a #Thailand nexus since 2014.
And there's a lot of circumstantial evidence...
10/ When you read the @iLawFX & @DigitalReachSEA report, it's clear: the entity responsible for the hacking has a detailed & obsessive focus on voices calling for democracy and reform of the monarchy in #Thailand.
12/ This investigation only happened because victims came forward & participated.
#Pegasus can make people feel powerless about digital security, yet they acted to reclaim some agency & are now helping to shed light on the secret mechanics of repression.
It's deeply inspiring.
13/ Special thanks to the team at @AmnestyTech, which independently analyzed a sample of indicators in this case & confirmed Pegasus infections using their distinct tools and methods.
14/ This investigation was a team production, ranging from the incredible work done by our collaborators @iLawFX and @DigitalReachSEA, civil society groups that prefer to remain unnamed, and the @citizenlab team including👇
Friends don't let friends get their eyeballs scanned to buy a coffee.
Sam Altman's Orwellian "Tools for Humanity" says this dystopia machine could help distinguish between #AI agents & humans... or verify at Point of Sale..or..?
Looks to me like a big biometric data grab 1/
2/ Surely they didn't just start with the idea of invasively harvesting eyeball scans...and then look around for potential justifications.
And then add in some AI hype.
Right?
3/ Throwback to Tools for Humanity's previous (but non-portable, guys!) eye-scanning thing: WorldCoin.
Remember that? A global biometric data grab rife with documented exploitation in Africa & Latin America.
Still not clear what real value it delivered to the ppl who gave up their biometrics.
3/ We got a tip about a single bit of #Paragon infrastructure & my brilliant colleague @billmarczak developed a technique to fingerprint some of the mercenary spyware infrastructure (both victim-facing & customer side) globally.
#Paragon's carefully constructed image of being a clean mercenary spyware company that wasn't susceptible to abuses has been replaced by a more familiar tale of...
Abuses...
And #Italy is now saddled with an unfolding crisis around spyware abuse.