haxor@derp.fooMB to Hacker News@derp.fooEnglish · 11 months ago4-year campaign backdoored iPhones using possibly most advanced exploit everarstechnica.comexternal-linkmessage-square3fedilinkarrow-up120arrow-down11file-textcross-posted to: [email protected][email protected][email protected][email protected]technology[email protected][email protected][email protected]
arrow-up119arrow-down1external-link4-year campaign backdoored iPhones using possibly most advanced exploit everarstechnica.comhaxor@derp.fooMB to Hacker News@derp.fooEnglish · 11 months agomessage-square3fedilinkfile-textcross-posted to: [email protected][email protected][email protected][email protected]technology[email protected][email protected][email protected]
minus-squareQuacksalber@sh.itjust.workslinkfedilinkEnglisharrow-up4·11 months agoClosed-source hardware and software, like a pinata of vulnerability. You never know when and how you’re hit.
Closed-source hardware and software, like a pinata of vulnerability. You never know when and how you’re hit.