

2·
2 days agoYou’ve already gotten a lot of responses about the first claim.
But to answer the second one:
Why would they mess with a specific app if they already control the OS? They could read everything they ever wanted from memory without anyone noticing.

And what if your target is using a different app for messaging?
I agree that blindly going trough memory isn’t the best solution. To catch everything, a keylogger as part of the input-handler of the OS would probably be the way to go.