It’s ok. The US government decided Russia isn’t a cyberthreat anymore.
https://www.theguardian.com/us-news/2025/feb/28/trump-russia-hacking-cyber-security
Uh, no shit. State backed espionage groups are targeting the communications channels used by their primary targets. What are you going to tell me next? That water is wet and fire is hot? If the US government started using IP over Avian Carrier (RFC1149) you can bet that the GRU would start up a program to intercept the carriers.
As of March 2023, Pegasus operators were able to remotely install the spyware on iOS versions through 16.0.3 using a zero-click exploit. While the capabilities of Pegasus may vary over time due to software updates, Pegasus is generally capable of reading text messages, call snooping, collecting passwords, location tracking, accessing the target device’s microphone and camera, and harvesting information from apps.
This is consumer grade spyware built by Israeli intelligence and loaned out to just about everyone. It’s been around for a decade. Governments use this to hunt down activists and opposition party members.
This Signal leak is one hole in the colander. Sure, water will leak through that hole. But water will also leak through all the other holes. And the countries collecting that water have more than what NSO Group contracts out.
https://duckduckgo.com/?q=kremlin+targetting+signal+accounts&t=fpas&ia=web
it seems there’s some real mechanism, involved in this…
Here’s the best-quality information I could readily-find…
https://cloud.google.com/blog/topics/threat-intelligence/russia-targeting-signal-messenger
Witkoff in Moscow when added to chat?
https://bsky.app/profile/olgalautman.bsky.social/post/3ll663snbc224