GrapheneOS on Nostr: "The most straightforward way to do this would involve having physical access to a ...
"The most straightforward way to do this would involve having physical access to a victim's phone as well as their system password or another exploitable vulnerability that would allow them to make changes to settings. Google's Fernandez emphasized this limiting factor as well."