{"id":27298,"date":"2026-02-24T15:07:40","date_gmt":"2026-02-24T20:07:40","guid":{"rendered":"https:\/\/www.planhub.ca\/blog\/?p=27298"},"modified":"2026-02-24T15:09:31","modified_gmt":"2026-02-24T20:09:31","slug":"cartel-grade-spyware-canada-bypass-encryption","status":"publish","type":"post","link":"https:\/\/www.planhub.ca\/blog\/en\/cartel-grade-spyware-canada-bypass-encryption\/","title":{"rendered":"The Trickle-Down of Cyber Warfare: Cartel-Grade Spyware and the Rise of ODITs"},"content":{"rendered":"\n<p>Court documents tied to accused criminal and former Olympian Ryan Wedding have brought a chilling cybersecurity reality to Canadian soil: the deployment of &#8220;cartel-grade&#8221; spyware. Accusations suggest that criminal syndicates are now utilizing high-end. Zero-click phone hacking software, capabilities once strictly reserved for nation-states and intelligence agencies.<\/p>\n\n\n\n<p>This alleged software was capable of tracking targets in real-time and intercepting securely encrypted communications like WhatsApp. This represents a dangerous shift in the digital landscape, where commercialized, military-grade surveillance tools are proliferating beyond government oversight.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">How the Software Works: Bypassing Encryption<\/h1>\n\n\n\n<p>When an application like WhatsApp or Signal uses &#8220;end-to-end encryption&#8221;. The data is scrambled while traveling across the internet. It cannot be intercepted in transit.<\/p>\n\n\n\n<p>However,&nbsp;<strong>ODITs (On-Device Investigative or Interception Tools)<\/strong>&nbsp;bypass this entirely by hacking the&nbsp;<em>endpoint,<\/em>&nbsp;the phone itself. Once the software gains deep root or kernel-level access to the device&#8217;s operating system (iOS or Android). It no longer needs to crack the encryption. Instead, it operates like a digital shadow, silently reading messages on the screen&nbsp;<em>after<\/em>&nbsp;they are decrypted. Logging keystrokes, and activating the microphone or GPS at will.<\/p>\n\n\n\n<p>Canada&#8217;s privacy watchdog notes that while ODITs are sometimes legally used by law enforcement with warrants. The underlying software architecture is virtually identical to malicious spyware.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"536\" src=\"https:\/\/www.planhub.ca\/blog\/wp-content\/uploads\/2026\/02\/spy-phone-1024x536.jpg\" alt=\"\" class=\"wp-image-27303\" srcset=\"https:\/\/www.planhub.ca\/blog\/wp-content\/uploads\/2026\/02\/spy-phone-1024x536.jpg 1024w, https:\/\/www.planhub.ca\/blog\/wp-content\/uploads\/2026\/02\/spy-phone-300x157.jpg 300w, https:\/\/www.planhub.ca\/blog\/wp-content\/uploads\/2026\/02\/spy-phone-768x402.jpg 768w, https:\/\/www.planhub.ca\/blog\/wp-content\/uploads\/2026\/02\/spy-phone.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h1 class=\"wp-block-heading\">Known and Rumored High-End Spyware Apps<\/h1>\n\n\n\n<p>The specific tool used in the Wedding case remains unnamed in public reporting. Operating in the shadowy crossover between black-market crimeware and commercial surveillance. However, it exists within a well-documented ecosystem of mercenary spyware.<\/p>\n\n\n\n<p>Here are the most prominent known and rumored tools in this category:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Pegasus (NSO Group):<\/strong>&nbsp;The most infamous of all. Pegasus is a highly sophisticated, zero-click spyware (meaning the target does not even need to click a link to be infected). It exploit hidden vulnerabilities in apps like iMessage or WhatsApp to take complete control of a phone. Turning it into a 24\/7 surveillance bug.<\/li>\n\n\n\n<li><strong>Predator (Cytrox \/ Intellexa Alliance):<\/strong>&nbsp;A major competitor to Pegasus. Predator has been heavily documented by Citizen Lab and is known to infect devices via malicious links (one-click) or zero-click exploits. Targeting civil society, journalists, and politicians globally.<\/li>\n\n\n\n<li><strong>Reign (QuaDream):<\/strong>&nbsp;Developed by an Israeli firm founded by former NSO employees. Reign reportedly utilized &#8220;invisible&#8221; iCloud calendar invitations to infect iPhones without user interaction, offering capabilities similar to Pegasus.<\/li>\n\n\n\n<li><strong>Hermit (RCS Lab):<\/strong>&nbsp;An enterprise-grade spyware deployed by governments. It typically tricks users into downloading a malicious application (often disguised as a telecom or messaging app update) to gain deep access to contacts, audio recordings, and location data.<\/li>\n\n\n\n<li><strong>FinSpy \/ FinFisher (Gamma International)<\/strong> <strong>:<\/strong>&nbsp;An older but historically devastating suite of surveillance software used by law enforcement and intelligence agencies globally to monitor targets across desktop and mobile platforms.<\/li>\n\n\n\n<li><strong>The &#8220;Wedding&#8221; Custom ODIT (Rumored\/Unnamed):<\/strong>&nbsp;The tool described in the Canadian court records. It represents a terrifying evolution: tools possessing Pegasus-like capabilities (real-time GPS, encrypted message interception) purchased and deployed directly via criminal connections rather than state actors.<\/li>\n<\/ul>\n\n\n\n<h1 class=\"wp-block-heading\">The Danger of Proliferation<\/h1>\n\n\n\n<p>The core issue highlighted by Citizen Lab and privacy advocates is the commercialization of these tools. The business model of &#8220;lawful intercept&#8221; companies relies on discovering zero-day vulnerabilities (flaws unknown to Apple or Google) and weaponizing them.<\/p>\n\n\n\n<p>When these tools leak, or when the companies selling them have lax oversight. The software inevitably falls into the hands of human rights abusers, or in this case, alleged transnational organized crime<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Court documents tied to accused criminal and former Olympian Ryan Wedding have brought a chilling cybersecurity reality to Canadian soil: the deployment of &#8220;cartel-grade&#8221; spyware. Accusations suggest that criminal syndicates are now utilizing high-end. Zero-click phone hacking software, capabilities once strictly reserved for nation-states and intelligence agencies. This alleged software was capable of tracking targets [&hellip;]<\/p>\n","protected":false},"author":45,"featured_media":27301,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[823,829,487,822,828,816],"tags":[],"class_list":["post-27298","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mobile-articles","category-telecom-articles","category-mobile","category-mobile-news","category-telecom-news","category-telecom"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cartel-grade spyware in Canada: how it can bypass encryption |<\/title>\n<meta name=\"description\" content=\"CBC-cited court documents point to on-device interception tools (ODIT). Here\u2019s how phone compromise can bypass end-to-end encryption.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.planhub.ca\/blog\/en\/cartel-grade-spyware-canada-bypass-encryption\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cartel-grade spyware in Canada: how it can bypass encryption |\" \/>\n<meta property=\"og:description\" content=\"CBC-cited court documents point to on-device interception tools (ODIT). Here\u2019s how phone compromise can bypass end-to-end encryption.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.planhub.ca\/blog\/en\/cartel-grade-spyware-canada-bypass-encryption\/\" \/>\n<meta property=\"og:site_name\" content=\"PlanHub.ca The Blog - Promotions, Guides, News and more!\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/planhub.ca\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-24T20:07:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-24T20:09:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.planhub.ca\/blog\/wp-content\/uploads\/2026\/02\/Capture-decran-2026-02-24-143050.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1344\" \/>\n\t<meta property=\"og:image:height\" content=\"721\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Julien Junet\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PlanHub_ca\" \/>\n<meta name=\"twitter:site\" content=\"@PlanHub_ca\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Julien Junet\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.planhub.ca\\\/blog\\\/en\\\/cartel-grade-spyware-canada-bypass-encryption\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.planhub.ca\\\/blog\\\/en\\\/cartel-grade-spyware-canada-bypass-encryption\\\/\"},\"author\":{\"name\":\"Julien Junet\",\"@id\":\"https:\\\/\\\/www.planhub.ca\\\/blog\\\/en\\\/#\\\/schema\\\/person\\\/5ecfc59983e63eb2b1d8095b96929828\"},\"headline\":\"The Trickle-Down of Cyber Warfare: Cartel-Grade Spyware and the Rise of ODITs\",\"datePublished\":\"2026-02-24T20:07:40+00:00\",\"dateModified\":\"2026-02-24T20:09:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.planhub.ca\\\/blog\\\/en\\\/cartel-grade-spyware-canada-bypass-encryption\\\/\"},\"wordCount\":585,\"publisher\":{\"@id\":\"https:\\\/\\\/www.planhub.ca\\\/blog\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.planhub.ca\\\/blog\\\/en\\\/cartel-grade-spyware-canada-bypass-encryption\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.planhub.ca\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/Capture-decran-2026-02-24-143050.png\",\"articleSection\":[\"Articles\",\"Articles\",\"Mobile\",\"News\",\"News\",\"Telecom\"],\"inLanguage\":\"en-CA\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.planhub.ca\\\/blog\\\/en\\\/cartel-grade-spyware-canada-bypass-encryption\\\/\",\"url\":\"https:\\\/\\\/www.planhub.ca\\\/blog\\\/en\\\/cartel-grade-spyware-canada-bypass-encryption\\\/\",\"name\":\"Cartel-grade spyware in Canada: how it can bypass encryption |\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.planhub.ca\\\/blog\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.planhub.ca\\\/blog\\\/en\\\/cartel-grade-spyware-canada-bypass-encryption\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.planhub.ca\\\/blog\\\/en\\\/cartel-grade-spyware-canada-bypass-encryption\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.planhub.ca\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/Capture-decran-2026-02-24-143050.png\",\"datePublished\":\"2026-02-24T20:07:40+00:00\",\"dateModified\":\"2026-02-24T20:09:31+00:00\",\"description\":\"CBC-cited court documents point to on-device interception tools (ODIT). Here\u2019s how phone compromise can bypass end-to-end encryption.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.planhub.ca\\\/blog\\\/en\\\/cartel-grade-spyware-canada-bypass-encryption\\\/#breadcrumb\"},\"inLanguage\":\"en-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.planhub.ca\\\/blog\\\/en\\\/cartel-grade-spyware-canada-bypass-encryption\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\\\/\\\/www.planhub.ca\\\/blog\\\/en\\\/cartel-grade-spyware-canada-bypass-encryption\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.planhub.ca\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/Capture-decran-2026-02-24-143050.png\",\"contentUrl\":\"https:\\\/\\\/www.planhub.ca\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/Capture-decran-2026-02-24-143050.png\",\"width\":1344,\"height\":721},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.planhub.ca\\\/blog\\\/en\\\/cartel-grade-spyware-canada-bypass-encryption\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.planhub.ca\\\/blog\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobile\",\"item\":\"https:\\\/\\\/www.planhub.ca\\\/blog\\\/en\\\/category\\\/mobile\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The Trickle-Down of Cyber Warfare: Cartel-Grade Spyware and the Rise of ODITs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.planhub.ca\\\/blog\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.planhub.ca\\\/blog\\\/en\\\/\",\"name\":\"PlanHub.ca The Blog - Promotions, Guides, News and more!\",\"description\":\"PlanHub.ca\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.planhub.ca\\\/blog\\\/en\\\/#organization\"},\"alternateName\":\"PlanHub.ca The Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.planhub.ca\\\/blog\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-CA\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.planhub.ca\\\/blog\\\/en\\\/#organization\",\"name\":\"PlanHub.ca\",\"alternateName\":\"PlanHub.ca\",\"url\":\"https:\\\/\\\/www.planhub.ca\\\/blog\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\\\/\\\/www.planhub.ca\\\/blog\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.planhub.ca\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/logo_planhub_horizontal_vert-2-2.png\",\"contentUrl\":\"https:\\\/\\\/www.planhub.ca\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/logo_planhub_horizontal_vert-2-2.png\",\"width\":900,\"height\":360,\"caption\":\"PlanHub.ca\"},\"image\":{\"@id\":\"https:\\\/\\\/www.planhub.ca\\\/blog\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/planhub.ca\",\"https:\\\/\\\/x.com\\\/PlanHub_ca\",\"https:\\\/\\\/ca.linkedin.com\\\/company\\\/planhub-ca\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.planhub.ca\\\/blog\\\/en\\\/#\\\/schema\\\/person\\\/5ecfc59983e63eb2b1d8095b96929828\",\"name\":\"Julien Junet\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5c7b073a472aada4b7dfe77caaae50b52a840a5ec45cb3c825eeeeea6334be00?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5c7b073a472aada4b7dfe77caaae50b52a840a5ec45cb3c825eeeeea6334be00?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5c7b073a472aada4b7dfe77caaae50b52a840a5ec45cb3c825eeeeea6334be00?s=96&d=blank&r=g\",\"caption\":\"Julien Junet\"},\"description\":\"Digital nomad driven by one simple question: how does technology shape our habits, choices, and instincts? Bridging music, visual art, and internet culture, he contributes to PlanHub through content, community work, moderation, and social media, and also writes for Branchez-vous.com. His playground is tech news, forums, online communities, and overlooked angles. His goal: cut through the noise, extract what matters, and help you see what\u2019s coming next.\",\"url\":\"https:\\\/\\\/www.planhub.ca\\\/blog\\\/en\\\/author\\\/julien\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cartel-grade spyware in Canada: how it can bypass encryption |","description":"CBC-cited court documents point to on-device interception tools (ODIT). Here\u2019s how phone compromise can bypass end-to-end encryption.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.planhub.ca\/blog\/en\/cartel-grade-spyware-canada-bypass-encryption\/","og_locale":"en_US","og_type":"article","og_title":"Cartel-grade spyware in Canada: how it can bypass encryption |","og_description":"CBC-cited court documents point to on-device interception tools (ODIT). Here\u2019s how phone compromise can bypass end-to-end encryption.","og_url":"https:\/\/www.planhub.ca\/blog\/en\/cartel-grade-spyware-canada-bypass-encryption\/","og_site_name":"PlanHub.ca The Blog - Promotions, Guides, News and more!","article_publisher":"https:\/\/www.facebook.com\/planhub.ca","article_published_time":"2026-02-24T20:07:40+00:00","article_modified_time":"2026-02-24T20:09:31+00:00","og_image":[{"width":1344,"height":721,"url":"https:\/\/www.planhub.ca\/blog\/wp-content\/uploads\/2026\/02\/Capture-decran-2026-02-24-143050.png","type":"image\/png"}],"author":"Julien Junet","twitter_card":"summary_large_image","twitter_creator":"@PlanHub_ca","twitter_site":"@PlanHub_ca","twitter_misc":{"Written by":"Julien Junet","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.planhub.ca\/blog\/en\/cartel-grade-spyware-canada-bypass-encryption\/#article","isPartOf":{"@id":"https:\/\/www.planhub.ca\/blog\/en\/cartel-grade-spyware-canada-bypass-encryption\/"},"author":{"name":"Julien Junet","@id":"https:\/\/www.planhub.ca\/blog\/en\/#\/schema\/person\/5ecfc59983e63eb2b1d8095b96929828"},"headline":"The Trickle-Down of Cyber Warfare: Cartel-Grade Spyware and the Rise of ODITs","datePublished":"2026-02-24T20:07:40+00:00","dateModified":"2026-02-24T20:09:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.planhub.ca\/blog\/en\/cartel-grade-spyware-canada-bypass-encryption\/"},"wordCount":585,"publisher":{"@id":"https:\/\/www.planhub.ca\/blog\/en\/#organization"},"image":{"@id":"https:\/\/www.planhub.ca\/blog\/en\/cartel-grade-spyware-canada-bypass-encryption\/#primaryimage"},"thumbnailUrl":"https:\/\/www.planhub.ca\/blog\/wp-content\/uploads\/2026\/02\/Capture-decran-2026-02-24-143050.png","articleSection":["Articles","Articles","Mobile","News","News","Telecom"],"inLanguage":"en-CA"},{"@type":"WebPage","@id":"https:\/\/www.planhub.ca\/blog\/en\/cartel-grade-spyware-canada-bypass-encryption\/","url":"https:\/\/www.planhub.ca\/blog\/en\/cartel-grade-spyware-canada-bypass-encryption\/","name":"Cartel-grade spyware in Canada: how it can bypass encryption |","isPartOf":{"@id":"https:\/\/www.planhub.ca\/blog\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.planhub.ca\/blog\/en\/cartel-grade-spyware-canada-bypass-encryption\/#primaryimage"},"image":{"@id":"https:\/\/www.planhub.ca\/blog\/en\/cartel-grade-spyware-canada-bypass-encryption\/#primaryimage"},"thumbnailUrl":"https:\/\/www.planhub.ca\/blog\/wp-content\/uploads\/2026\/02\/Capture-decran-2026-02-24-143050.png","datePublished":"2026-02-24T20:07:40+00:00","dateModified":"2026-02-24T20:09:31+00:00","description":"CBC-cited court documents point to on-device interception tools (ODIT). Here\u2019s how phone compromise can bypass end-to-end encryption.","breadcrumb":{"@id":"https:\/\/www.planhub.ca\/blog\/en\/cartel-grade-spyware-canada-bypass-encryption\/#breadcrumb"},"inLanguage":"en-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.planhub.ca\/blog\/en\/cartel-grade-spyware-canada-bypass-encryption\/"]}]},{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/www.planhub.ca\/blog\/en\/cartel-grade-spyware-canada-bypass-encryption\/#primaryimage","url":"https:\/\/www.planhub.ca\/blog\/wp-content\/uploads\/2026\/02\/Capture-decran-2026-02-24-143050.png","contentUrl":"https:\/\/www.planhub.ca\/blog\/wp-content\/uploads\/2026\/02\/Capture-decran-2026-02-24-143050.png","width":1344,"height":721},{"@type":"BreadcrumbList","@id":"https:\/\/www.planhub.ca\/blog\/en\/cartel-grade-spyware-canada-bypass-encryption\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.planhub.ca\/blog\/en\/"},{"@type":"ListItem","position":2,"name":"Mobile","item":"https:\/\/www.planhub.ca\/blog\/en\/category\/mobile\/"},{"@type":"ListItem","position":3,"name":"The Trickle-Down of Cyber Warfare: Cartel-Grade Spyware and the Rise of ODITs"}]},{"@type":"WebSite","@id":"https:\/\/www.planhub.ca\/blog\/en\/#website","url":"https:\/\/www.planhub.ca\/blog\/en\/","name":"PlanHub.ca The Blog - Promotions, Guides, News and more!","description":"PlanHub.ca","publisher":{"@id":"https:\/\/www.planhub.ca\/blog\/en\/#organization"},"alternateName":"PlanHub.ca The Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.planhub.ca\/blog\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-CA"},{"@type":"Organization","@id":"https:\/\/www.planhub.ca\/blog\/en\/#organization","name":"PlanHub.ca","alternateName":"PlanHub.ca","url":"https:\/\/www.planhub.ca\/blog\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/www.planhub.ca\/blog\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.planhub.ca\/blog\/wp-content\/uploads\/2024\/04\/logo_planhub_horizontal_vert-2-2.png","contentUrl":"https:\/\/www.planhub.ca\/blog\/wp-content\/uploads\/2024\/04\/logo_planhub_horizontal_vert-2-2.png","width":900,"height":360,"caption":"PlanHub.ca"},"image":{"@id":"https:\/\/www.planhub.ca\/blog\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/planhub.ca","https:\/\/x.com\/PlanHub_ca","https:\/\/ca.linkedin.com\/company\/planhub-ca"]},{"@type":"Person","@id":"https:\/\/www.planhub.ca\/blog\/en\/#\/schema\/person\/5ecfc59983e63eb2b1d8095b96929828","name":"Julien Junet","image":{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/secure.gravatar.com\/avatar\/5c7b073a472aada4b7dfe77caaae50b52a840a5ec45cb3c825eeeeea6334be00?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/5c7b073a472aada4b7dfe77caaae50b52a840a5ec45cb3c825eeeeea6334be00?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5c7b073a472aada4b7dfe77caaae50b52a840a5ec45cb3c825eeeeea6334be00?s=96&d=blank&r=g","caption":"Julien Junet"},"description":"Digital nomad driven by one simple question: how does technology shape our habits, choices, and instincts? Bridging music, visual art, and internet culture, he contributes to PlanHub through content, community work, moderation, and social media, and also writes for Branchez-vous.com. His playground is tech news, forums, online communities, and overlooked angles. His goal: cut through the noise, extract what matters, and help you see what\u2019s coming next.","url":"https:\/\/www.planhub.ca\/blog\/en\/author\/julien\/"}]}},"_links":{"self":[{"href":"https:\/\/www.planhub.ca\/blog\/en\/wp-json\/wp\/v2\/posts\/27298","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.planhub.ca\/blog\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.planhub.ca\/blog\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.planhub.ca\/blog\/en\/wp-json\/wp\/v2\/users\/45"}],"replies":[{"embeddable":true,"href":"https:\/\/www.planhub.ca\/blog\/en\/wp-json\/wp\/v2\/comments?post=27298"}],"version-history":[{"count":2,"href":"https:\/\/www.planhub.ca\/blog\/en\/wp-json\/wp\/v2\/posts\/27298\/revisions"}],"predecessor-version":[{"id":27311,"href":"https:\/\/www.planhub.ca\/blog\/en\/wp-json\/wp\/v2\/posts\/27298\/revisions\/27311"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.planhub.ca\/blog\/en\/wp-json\/wp\/v2\/media\/27301"}],"wp:attachment":[{"href":"https:\/\/www.planhub.ca\/blog\/en\/wp-json\/wp\/v2\/media?parent=27298"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.planhub.ca\/blog\/en\/wp-json\/wp\/v2\/categories?post=27298"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.planhub.ca\/blog\/en\/wp-json\/wp\/v2\/tags?post=27298"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}