Is it possible to hack every device that’s connected to the Internet?

I saw websites offering “hacker hiring” services via the Tor browser. A cybersecurity expert YouTuber said that some of these “hire-a-hacker” sites are real. They claim to do things like hacking phones or stealing social media accounts. So how is that even possible? Imagine you pay them to hack a phone. How could they locate the target phone? Let’s say they do find the target—how can they hack it remotely, from miles away, without social engineering?

submitted by /u/Snorem
[link] [comments]

from hacking: security in practice https://ift.tt/O9wXTPt

Comments