@return2ozma to TechnologyEnglish • 1 year ago4-year campaign backdoored iPhones using possibly the most advanced exploit everarstechnica.comexternal-linkmessage-square59arrow-up1545arrow-down110cross-posted to: [email protected][email protected][email protected]
arrow-up1535arrow-down1external-link4-year campaign backdoored iPhones using possibly the most advanced exploit everarstechnica.com@return2ozma to TechnologyEnglish • 1 year agomessage-square59cross-posted to: [email protected][email protected][email protected]
minus-square@TautvydaxxlinkEnglish17•1 year agoThere is no such thing as a device or software without exploit, even a carrier pigeon can be cought and the messege read.
minus-square@[email protected]linkfedilinkEnglish6•1 year agoNot if you wirte the message using invisible ink.
minus-square@[email protected]linkfedilinkEnglish3•1 year agoI wouldn’t trust a service whose source code is not accessible though.
minus-square@[email protected]linkfedilinkEnglish-1•1 year agoWe may not have carrier pigeon DNA readily available, but it is certainly accessible!
There is no such thing as a device or software without exploit, even a carrier pigeon can be cought and the messege read.
What if the pigeon has a gun?
That’s it boys. We’ve found the answer. Pack it up
iGun patch incoming
You are thinking of exploding penguins.
Not if you wirte the message using invisible ink.
Not if you never write the message, more like
I wouldn’t trust a service whose source code is not accessible though.
We may not have carrier pigeon DNA readily available, but it is certainly accessible!