{"id":17648,"date":"2023-12-22T09:49:12","date_gmt":"2023-12-22T09:49:12","guid":{"rendered":"https:\/\/cybercrime.rs\/?p=17648"},"modified":"2024-04-29T13:33:24","modified_gmt":"2024-04-29T13:33:24","slug":"stalerkware-za-nadzor-mobilnih-telefona-u-srbiji","status":"publish","type":"post","link":"https:\/\/cybercrime.rs\/en\/2023\/12\/22\/stalerkware-za-nadzor-mobilnih-telefona-u-srbiji\/","title":{"rendered":"Stalerkware for Cell Phone Surveillance in Serbia"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"17648\" class=\"elementor elementor-17648\">\n\t\t\t\t\t\t\t\t\t<section class=\"has_ae_slider elementor-section elementor-top-section elementor-element elementor-element-52419e6b elementor-section-boxed elementor-section-height-default elementor-section-height-default ae-bg-gallery-type-default\" data-id=\"52419e6b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_ae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7f7e3288 ae-bg-gallery-type-default\" data-id=\"7f7e3288\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-62e7a1d elementor-widget elementor-widget-spacer\" data-id=\"62e7a1d\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.7.8 - 02-10-2022 *\/\n.elementor-column .elementor-spacer-inner{height:var(--spacer-size)}.e-container{--container-widget-width:100%}.e-container>.elementor-widget-spacer{width:var(--container-widget-width,var(--spacer-size));-ms-flex-item-align:stretch;align-self:stretch;-ms-flex-negative:0;flex-shrink:0}.e-container>.elementor-widget-spacer>.elementor-widget-container,.e-container>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer{height:100%}.e-container>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer>.elementor-spacer-inner{height:var(--container-widget-height,var(--spacer-size))}<\/style>\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ee3fb14 elementor-widget elementor-widget-text-editor\" data-id=\"1ee3fb14\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.7.8 - 02-10-2022 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#818a91;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#818a91;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<!-- wp:paragraph -->\n<p>Under the guise of protecting children, emotional relationships, as well as checking workers in companies, a few Serbian websites offer digital espionage services, i.e. software for monitoring mobile devices and computers. This legally poorly regulated trade allows individuals with malicious intentions to simply abuse, while \"stores\", on the other hand, offer products by practically checking nothing, keeping no records, justifying that the responsibility for potential abuses rests solely with the clients. Although you need to own the target phone to install the software, there are many ways to do it seamlessly. In other words, these \"stalerkware\" softwares create the possibility for everyone to eavesdrop on everyone in their environment.<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c724478 elementor-widget elementor-widget-spacer\" data-id=\"c724478\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9c6c907 elementor-widget elementor-widget-text-editor\" data-id=\"9c6c907\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul>\n<li>What are the technical capabilities of the software and who has the access to the data?<\/li>\n<li>What does the law say?<\/li>\n<li>Are these \"stores\" allowed to sell or resell licenses for stalkerware?<\/li>\n<li>What are the consequences of unlimited use of them?<\/li>\n<\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ddf0512 elementor-widget elementor-widget-spacer\" data-id=\"ddf0512\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3051a9e elementor-widget elementor-widget-text-editor\" data-id=\"3051a9e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p class=\" translation-block\">Read in two installments, published in the weekly \"Vreme\":<\/p>\n<p>\u00a0<\/p>\n<p><span style=\"color: #ead181;\">Cell Phone Surveillance (Part One): <\/span><span style=\"color: #e3b969;\"><span style=\"color: #ead181;\">Eavesdropping Available to Everyone<\/span> <a style=\"color: #e3b969;\" href=\"https:\/\/www.vreme.com\/vreme\/prisluskivanje-dostupno-svima\/\" target=\"_blank\" rel=\"noopener\">&gt;&gt;<\/a><\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"color: #ead181;\">Cell Phone Surveillance (Part Two): <\/span><span style=\"color: #e3b969;\"><span style=\"color: #ead181;\">Abuse Without Limits<\/span> <a style=\"color: #e3b969;\" href=\"https:\/\/www.vreme.com\/vreme\/zloupotreba-bez-ogranicenja\/\" target=\"_blank\" rel=\"noopener\">&gt;&gt;<\/a><\/span><\/p>\n<p>\u00a0<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>How do internet \"stores\" in Serbia offer tempting equipment for monitoring mobile devices and computers?<\/p>","protected":false},"author":1,"featured_media":9975,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"site-sidebar-layout":"default","site-content-layout":"default","ast-global-header-display":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","footnotes":""},"categories":[36,37],"tags":[],"class_list":["post-17648","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybercrime","category-srbija"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cybercrime.rs\/en\/wp-json\/wp\/v2\/posts\/17648","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybercrime.rs\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybercrime.rs\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybercrime.rs\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cybercrime.rs\/en\/wp-json\/wp\/v2\/comments?post=17648"}],"version-history":[{"count":13,"href":"https:\/\/cybercrime.rs\/en\/wp-json\/wp\/v2\/posts\/17648\/revisions"}],"predecessor-version":[{"id":18201,"href":"https:\/\/cybercrime.rs\/en\/wp-json\/wp\/v2\/posts\/17648\/revisions\/18201"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybercrime.rs\/en\/wp-json\/wp\/v2\/media\/9975"}],"wp:attachment":[{"href":"https:\/\/cybercrime.rs\/en\/wp-json\/wp\/v2\/media?parent=17648"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybercrime.rs\/en\/wp-json\/wp\/v2\/categories?post=17648"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybercrime.rs\/en\/wp-json\/wp\/v2\/tags?post=17648"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}