Another look at students, AI, and Essays on the Search Engine podcast. "What should we do about teens using AI to do their homework?"
Opinions from students and experts.
Malicious QR codes were used to establish a separate device as a 'linked device' which would allow the attacker to receive and read Signal messages sent to and from the target
I think this is the answer. Thanks for your recommendation. I'll test this out soon. It seems to check all the boxes and I found this website providing good reasons to use it.
The reasons I prefer Jitsi Meet to Zoom include the following:
Try Molly instead which is a hardened fork of Signal. Molly uses the same servers and is transparent to the operator.
You can install Molly through F-Droid or Accrescent.
In depth review validating the credibility of Signal's encryption by a Security Engineer who specializes in encryption.
Reviewing the Cryptography Used by Signal by Soatok
The bottom line was in total, no vulnerabilities were found.
The exact example I also thought of from the question! Well done