@return2ozma to TechnologyEnglish • 11 months ago4-year campaign backdoored iPhones using possibly the most advanced exploit everarstechnica.comexternal-linkmessage-square59arrow-up1545arrow-down110cross-posted to: [email protected][email protected][email protected]
arrow-up1535arrow-down1external-link4-year campaign backdoored iPhones using possibly the most advanced exploit everarstechnica.com@return2ozma to TechnologyEnglish • 11 months agomessage-square59cross-posted to: [email protected][email protected][email protected]
minus-square@TautvydaxxlinkEnglish17•11 months agoThere is no such thing as a device or software without exploit, even a carrier pigeon can be cought and the messege read.
minus-square@[email protected]linkfedilinkEnglish6•11 months agoNot if you wirte the message using invisible ink.
minus-square@[email protected]linkfedilinkEnglish3•11 months agoI wouldn’t trust a service whose source code is not accessible though.
minus-square@[email protected]linkfedilinkEnglish-1•11 months agoWe may not have carrier pigeon DNA readily available, but it is certainly accessible!
There is no such thing as a device or software without exploit, even a carrier pigeon can be cought and the messege read.
What if the pigeon has a gun?
That’s it boys. We’ve found the answer. Pack it up
You are thinking of exploding penguins.
iGun patch incoming
Not if you wirte the message using invisible ink.
Not if you never write the message, more like
I wouldn’t trust a service whose source code is not accessible though.
We may not have carrier pigeon DNA readily available, but it is certainly accessible!