haxor@derp.fooMB to Hacker News@derp.fooEnglish · 9 months ago4-year campaign backdoored iPhones using possibly most advanced exploit everarstechnica.comexternal-linkmessage-square2fedilinkarrow-up120arrow-down12file-textcross-posted to: todayilearned@lemmit.onlineprivacy@programming.devtechnology@lemmy.ziptechnology@lemmy.worldtechnology@lemmit.online
arrow-up118arrow-down1external-link4-year campaign backdoored iPhones using possibly most advanced exploit everarstechnica.comhaxor@derp.fooMB to Hacker News@derp.fooEnglish · 9 months agomessage-square2fedilinkfile-textcross-posted to: todayilearned@lemmit.onlineprivacy@programming.devtechnology@lemmy.ziptechnology@lemmy.worldtechnology@lemmit.online
minus-squareLojcs@lemm.eelinkfedilinkEnglisharrow-up1·9 months agoI think the most important takeaway here is that apple has a backdoor to memory isolated processes.
I think the most important takeaway here is that apple has a backdoor to memory isolated processes.