Messaging used as possible form of identity theft on operating systems.

edit

I am researching the possible ways to digitally pass malicious forms of data through the servers into the users device. And the ramifications of the embedded messages ability to latch on to the internal storage without sending any red flags or blocked by even default operating systems firewalls . As I read about the forms of infrared photos and saw how simple it would be to use maliciously invert the embedded message or code and then use the clock as a trigger to activate the message or send a signal or sound so the information can be retrieved remotely. Danielmgriffin81 (talk) 16:37, 5 August 2019 (UTC)Reply