
Unfortunately, this time we don't know any details because Google-the only company that has the whole story behind these bugs-has not said much at all about how it found the bugs, who was using them, and whom they were being used against.

China has conducted a widespread, systemic campaign of physical and technical oppression and surveillance against the Muslim minority. Last year, Google found a series of zero-days-vulnerabilities that at the time of discovery are unknown to the software maker-that spies were using to target the Uighur community. In this case, however, we know that the bugs were being used for hacking operations. Often, bugs in modern software are found and are ethically disclosed by security researchers, which means that they are fixed before they are widely exploited to hack people. So far, very little information has come out about who may have been using the exploits and who they were targeting.
