@[email protected]MB to Hacker [email protected]English • 1 year ago4-year campaign backdoored iPhones using possibly most advanced exploit everarstechnica.comexternal-linkmessage-square3fedilinkarrow-up120arrow-down12file-textcross-posted to: [email protected][email protected]technology
arrow-up118arrow-down1external-link4-year campaign backdoored iPhones using possibly most advanced exploit everarstechnica.com@[email protected]MB to Hacker [email protected]English • 1 year agomessage-square3fedilinkfile-textcross-posted to: [email protected][email protected]technology
minus-square@[email protected]linkfedilinkEnglish4•1 year agoClosed-source hardware and software, like a pinata of vulnerability. You never know when and how you’re hit.
Closed-source hardware and software, like a pinata of vulnerability. You never know when and how you’re hit.