{"id":35675,"date":"2020-06-23T14:56:39","date_gmt":"2020-06-23T14:56:39","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/31326\/Privacy-Focused-OS-Wants-To-Know-How-Facebook-And-The-FBI-Hacked-It.html"},"modified":"2020-06-23T14:56:39","modified_gmt":"2020-06-23T14:56:39","slug":"privacy-focused-os-wants-to-know-how-facebook-and-the-fbi-hacked-it","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/privacy-focused-os-wants-to-know-how-facebook-and-the-fbi-hacked-it\/","title":{"rendered":"Privacy-Focused OS Wants To Know How Facebook And The FBI Hacked It"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/video-images.vice.com\/test-uploads\/articles\/5ef0f1e5aea1330097d9e1bd\/lede\/1592850087632-image1.png?crop=1xw:0.9995xh;center,center&amp;resize=1200:*\" class=\"ff-og-image-inserted\"><\/div>\n<p>The developers of a privacy-focused operating system championed by Edward Snowden are scrambling to find out the details of a hack that the FBI used\u2014and Facebook paid for\u2014to unmask a child predator.<\/p>\n<p>Last week, Motherboard revealed that Facebook <a href=\"https:\/\/www.vice.com\/en_us\/article\/v7gd9b\/facebook-helped-fbi-hack-child-predator-buster-hernandez\" target=\"_blank\" rel=\"noopener noreferrer\">had paid six figures to a cybersecurity firm to develop a hacking tool<\/a> that the company then handed to the FBI in 2017. At the time, Facebook and law enforcement had spent years tracking a California man, who went by the name of Brian Kil online. The man, whose real name was Buster Hernandez, was using Facebook to harass and extort teenage girls, forcing them to send nude pictures of themselves, threatening to kill them and murder their friends.<\/p>\n<p>The hacking tool relied on an unknown flaw\u2014also called a <a href=\"https:\/\/www.vice.com\/en_us\/article\/mg79v4\/hacking-glossary\" target=\"_blank\" rel=\"noopener noreferrer\">zero-day<\/a> in hacker lingo\u2014in the default video player included in Tails, <a href=\"https:\/\/www.wired.com\/2014\/04\/tails\/\" target=\"_blank\" rel=\"noopener noreferrer\">a well-known Linux-based operating system<\/a> that\u2019s used by journalists, dissidents, human rights activists, and security-focused users all over the world. For example, Tails is part of the anonymous tip submission system SecureDrop, which is used by dozens of newsrooms all over the world, <a href=\"https:\/\/news.vice.com\/securedrop\/\" target=\"_blank\" rel=\"noopener noreferrer\">including VICE<\/a>.<\/p>\n<p>Tails\u2019 key feature is that all internet traffic gets routed through Tor, a network that encrypts and anonymizes connections, masking the users\u2019 real IP address.<\/p>\n<p class=\"article__pull-quote\">\u201cThey should have been notified.\u201d<\/p>\n<p>The exploit funded by Facebook allowed FBI agents to identify the user&#8217;s real IP address, which then allowed them to identify Brian Kil as Hernandez. Technically speaking, this hack could have been used against activists and other sensitive people by law enforcement or authoritarian governments. Motherboard reported that Facebook did not inform Tails of the exploit, and decided it was OK to use it because Tails was incidentally patching out the exploit as part of an unrelated update.<\/p>\n<p>But Tails developers, as well as privacy and security experts, agree that, update or not, Facebook should have alerted Tails once the FBI operation was over. Three years later, that has not happened yet, and the Tails developers, as well as the makers of the popular media player, called GNOME Videos, said they found out about all this through Motherboard\u2019s article.<\/p>\n<p>\u201cThe only way for Tails to be sure that every single aspect of the zero-day is indeed fixed already is to learn about the full details of the zero-day,\u201d a Tails spokesperson said in an email, arguing that it\u2019s possible that the flaw relied on a chain of other flaws that may still be partially unpatched. \u201cWithout these full details, we cannot have a strong guarantee that our current users are 100 percent safe from this zero-day as of today.\u201d<\/p>\n<p>Tails said that neither Facebook, the FBI, nor the cybersecurity firm hired by Facebook, has reached out to the developers\u2014even after they reached out asking for an explanation.<\/p>\n<p class=\"article__blockquote\"><strong><em>Do you work or did you use to work at Facebook? Do you work for the FBI or develop hacking tools for law enforcement? We\u2019d love to hear from you. You can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, OTR chat at lorenzofb@jabber.ccc.de, or email<\/em><\/strong> <a href=\"mailto:lorenzofb@vice.com\" target=\"_blank\" rel=\"noopener noreferrer\"><strong><em>lorenzofb@vice.com<\/em><\/strong><\/a><\/p>\n<p>The developers of the targeted video player said they haven\u2019t heard from anybody either.<\/p>\n<p>\u201cGNOME was not previously aware of this story, and is not able to guess which vulnerability might have been exploited,\u201d a spokesperson for the GNOME Project, the developers of a free and open source desktop environment and the GNOME Videos player, which are both included in several Linux distributions such as Ubuntu, told Motherboard in an email.<\/p>\n<p>The GNOME spokesperson said that they appreciated Facebook planning to report the vulnerability before discovering it was apparently already fixed, but many people who use their software may still be running an unpatched version. That\u2019s why they expect the FBI or Facebook to contact them to make sure they can alert all users.<\/p>\n<p>\u201cThe security of law-abiding users is jeopardized when such vulnerabilities are not disclosed to us in a timely manner,\u201d the spokesperson wrote.<\/p>\n<p>Facebook said they made an effort to reach out to Tails in the last week, and had confirmation from the FBI that this technique would be used for this case only. (The Tails spokesperson said that, as of Thursday, they had not heard from Facebook.)<\/p>\n<p>I asked an FBI spokesperson whether the FBI used the hacking tool funded by Facebook in other cases, whether it still is in possession of it, and whether it submitted it to a government process that determines whether agencies should keep the flaw secret or notify the software makers, technically known as the <a href=\"https:\/\/www.wired.com\/story\/vulnerability-equity-process-charter-transparency-concerns\/\" target=\"_blank\" rel=\"noopener noreferrer\">Vulnerabilities Equities Process<\/a> or VEP.<\/p>\n<p>\u201cAppreciate you following up, but we still don&#8217;t have a comment for you,\u201d the FBI spokesperson said.<\/p>\n<p>It\u2019s unclear whether the zero-day flaw that the exploit relied on has been fixed. When they helped develop and paid for it, Facebook realized it was going to be fixed in an upcoming release, so they decided not to alert Tails developers, according to a former Facebook employee who worked on the project.<\/p>\n<p>That\u2019s perhaps beside the point. Should Facebook, the FBI, of the cybersecurity firm, have alerted Tails or GNOME after Buster Hernandez was safely behind bars?<\/p>\n<p>\u201cThey should have been notified,\u201d a current Facebook employee, who asked to remain anonymous because they were not allowed to speak to the press, told Motherboard.<\/p>\n<p>According to several privacy and security experts, the answer is a resounding yes as well. In fact, many think Facebook should not have gotten involved in making and paying for the hacking tool in the first place.<\/p>\n<p class=\"article__pull-quote\">\u201dFacebook is out of control at best and is making the world less safe for people who need anonymity to survive.\u201d<\/p>\n<p>\u201cThe fact that Facebook or any private company would think they had the right to commission the creation of malware against another software entity is so incredibly arrogant,\u201d said Katie Mossouris, who used to lead the vulnerability research teams at Microsoft and Symantec and is one of the world\u2019s most well-known experts on coordinated disclosure. \u201cSecurity professionals worth their salt are worried about governments not making the right call when it comes to making decisions in the Vulnerability Equities Process, and we\u2019re all supposed to be fine with that kind of decision resting in Facebook\u2019s hands?\u201d<\/p>\n<p>According to Moussouris, what Facebook did in this case \u201cis more evidence that Facebook is out of control at best and is making the world less safe for people who need anonymity to survive.\u201d<\/p>\n<p>Moussouris used <a href=\"https:\/\/emojipedia.org\/person-facepalming\/#:~:text=%F0%9F%A4%A6%20Person%20Facepalming,of%20a%20person%20or%20situation.&amp;text=Person%20Facepalming%20was%20approved%20as,to%20Emoji%203.0%20in%202016.\" target=\"_blank\" rel=\"noopener noreferrer\">the facepalm emoji<\/a> when describing how she felt when she read the Motherboard story that revealed Facebook\u2019s role in the hacking of Hernandez.<\/p>\n<p>\u201cI didn\u2019t think a vulnerability disclosure story could possibly horrify me after all these years, but here we are,\u201d she said in an online chat.<\/p>\n<p>Harlo Holmes <a href=\"https:\/\/www.vice.com\/en_us\/article\/3k5w98\/the-activist-developer-who-helps-journalists-protect-data-and-sources\" target=\"_blank\" rel=\"noopener noreferrer\">has been developing tools for journalists and activists for years<\/a>, and now helps media organizations set up SecureDrop and trains their journalists to use tools such as Tails. Holmes said that Facebook needs to be more transparent as to what the vulnerability was exactly, and what the agreement with the FBI was.<\/p>\n<p>&#8220;What was in that contract? Was it a one time use license against this one actor? Or did they just hand it over to the FBI and be like &#8216;now this is in your arsenal now&#8217;?&#8221; Holmes said in a phone call. \u201cThose are very, very key questions.\u201d<\/p>\n<p>Moreover, she said that it\u2019s hard to understand how Facebook thought it would be OK to help the FBI hack a child molester, while the company is also suing the spyware maker NSO Group for using WhatsApp to help their customers hack targets.<\/p>\n<p>&#8220;The hypocrisy is absolutely wild,&#8221; she said. \u201cMore hackers should learn about the ethics of what we do, and this is a textbook example.<\/p>\n<p><strong><em>Subscribe to our new cybersecurity podcast,<\/em><\/strong> <a href=\"https:\/\/itunes.apple.com\/gb\/podcast\/cyber\/id1441708044?mt=2\" target=\"_blank\" rel=\"noopener noreferrer\"><strong><em>CYBER<\/em><\/strong><\/a><strong><em>.<\/em><\/strong><\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/31326\/Privacy-Focused-OS-Wants-To-Know-How-Facebook-And-The-FBI-Hacked-It.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":35676,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[8739],"class_list":["post-35675","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackerprivacyflawfacebookfbi"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Privacy-Focused OS Wants To Know How Facebook And The FBI Hacked It 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/privacy-focused-os-wants-to-know-how-facebook-and-the-fbi-hacked-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Privacy-Focused OS Wants To Know How Facebook And The FBI Hacked It 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/privacy-focused-os-wants-to-know-how-facebook-and-the-fbi-hacked-it\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-23T14:56:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/privacy-focused-os-wants-to-know-how-facebook-and-the-fbi-hacked-it.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1999\" \/>\n\t<meta property=\"og:image:height\" content=\"1124\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/privacy-focused-os-wants-to-know-how-facebook-and-the-fbi-hacked-it\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/privacy-focused-os-wants-to-know-how-facebook-and-the-fbi-hacked-it\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Privacy-Focused OS Wants To Know How Facebook And The FBI Hacked It\",\"datePublished\":\"2020-06-23T14:56:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/privacy-focused-os-wants-to-know-how-facebook-and-the-fbi-hacked-it\\\/\"},\"wordCount\":1329,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/privacy-focused-os-wants-to-know-how-facebook-and-the-fbi-hacked-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/privacy-focused-os-wants-to-know-how-facebook-and-the-fbi-hacked-it.jpg\",\"keywords\":[\"headline,hacker,privacy,flaw,facebook,fbi\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/privacy-focused-os-wants-to-know-how-facebook-and-the-fbi-hacked-it\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/privacy-focused-os-wants-to-know-how-facebook-and-the-fbi-hacked-it\\\/\",\"name\":\"Privacy-Focused OS Wants To Know How Facebook And The FBI Hacked It 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/privacy-focused-os-wants-to-know-how-facebook-and-the-fbi-hacked-it\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/privacy-focused-os-wants-to-know-how-facebook-and-the-fbi-hacked-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/privacy-focused-os-wants-to-know-how-facebook-and-the-fbi-hacked-it.jpg\",\"datePublished\":\"2020-06-23T14:56:39+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/privacy-focused-os-wants-to-know-how-facebook-and-the-fbi-hacked-it\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/privacy-focused-os-wants-to-know-how-facebook-and-the-fbi-hacked-it\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/privacy-focused-os-wants-to-know-how-facebook-and-the-fbi-hacked-it\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/privacy-focused-os-wants-to-know-how-facebook-and-the-fbi-hacked-it.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/privacy-focused-os-wants-to-know-how-facebook-and-the-fbi-hacked-it.jpg\",\"width\":1999,\"height\":1124},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/privacy-focused-os-wants-to-know-how-facebook-and-the-fbi-hacked-it\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,privacy,flaw,facebook,fbi\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackerprivacyflawfacebookfbi\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Privacy-Focused OS Wants To Know How Facebook And The FBI Hacked It\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Privacy-Focused OS Wants To Know How Facebook And The FBI Hacked It 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/privacy-focused-os-wants-to-know-how-facebook-and-the-fbi-hacked-it\/","og_locale":"en_US","og_type":"article","og_title":"Privacy-Focused OS Wants To Know How Facebook And The FBI Hacked It 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/privacy-focused-os-wants-to-know-how-facebook-and-the-fbi-hacked-it\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-06-23T14:56:39+00:00","og_image":[{"width":1999,"height":1124,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/privacy-focused-os-wants-to-know-how-facebook-and-the-fbi-hacked-it.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/privacy-focused-os-wants-to-know-how-facebook-and-the-fbi-hacked-it\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/privacy-focused-os-wants-to-know-how-facebook-and-the-fbi-hacked-it\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Privacy-Focused OS Wants To Know How Facebook And The FBI Hacked It","datePublished":"2020-06-23T14:56:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/privacy-focused-os-wants-to-know-how-facebook-and-the-fbi-hacked-it\/"},"wordCount":1329,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/privacy-focused-os-wants-to-know-how-facebook-and-the-fbi-hacked-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/privacy-focused-os-wants-to-know-how-facebook-and-the-fbi-hacked-it.jpg","keywords":["headline,hacker,privacy,flaw,facebook,fbi"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/privacy-focused-os-wants-to-know-how-facebook-and-the-fbi-hacked-it\/","url":"https:\/\/www.threatshub.org\/blog\/privacy-focused-os-wants-to-know-how-facebook-and-the-fbi-hacked-it\/","name":"Privacy-Focused OS Wants To Know How Facebook And The FBI Hacked It 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/privacy-focused-os-wants-to-know-how-facebook-and-the-fbi-hacked-it\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/privacy-focused-os-wants-to-know-how-facebook-and-the-fbi-hacked-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/privacy-focused-os-wants-to-know-how-facebook-and-the-fbi-hacked-it.jpg","datePublished":"2020-06-23T14:56:39+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/privacy-focused-os-wants-to-know-how-facebook-and-the-fbi-hacked-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/privacy-focused-os-wants-to-know-how-facebook-and-the-fbi-hacked-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/privacy-focused-os-wants-to-know-how-facebook-and-the-fbi-hacked-it\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/privacy-focused-os-wants-to-know-how-facebook-and-the-fbi-hacked-it.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/privacy-focused-os-wants-to-know-how-facebook-and-the-fbi-hacked-it.jpg","width":1999,"height":1124},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/privacy-focused-os-wants-to-know-how-facebook-and-the-fbi-hacked-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,privacy,flaw,facebook,fbi","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerprivacyflawfacebookfbi\/"},{"@type":"ListItem","position":3,"name":"Privacy-Focused OS Wants To Know How Facebook And The FBI Hacked It"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/35675","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=35675"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/35675\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/35676"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=35675"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=35675"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=35675"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}