in theory a software rooted echo would be superior to a bug; fairly high quality positioning by the victim which ensures good quality recordings and a fair amount of plausible deniability opportunities by the attacker. if discovery was considered inevitable software can be tripped into wiping data or reverting states.