Deep iPhone exploit
2023-12-28 00:48:29.016763+01 by Dan Lyke 2 comments
Huge chain of attacks that included using a PDF to trigger a TrueType font exploit and eventually led to using a memory mapped I/O exploit inside Apple's ARM devices.
2023-12-28 00:48:29.016763+01 by Dan Lyke 2 comments
Huge chain of attacks that included using a PDF to trigger a TrueType font exploit and eventually led to using a memory mapped I/O exploit inside Apple's ARM devices.
[ related topics: Apple Computer Work, productivity and environment Typography Graphic Design iPhone ]
comments in descending chronological order (reverse):
#Comment Re: Deep iPhone exploit made: 2023-12-29 04:28:32.452935+01 by: Dan Lyke
Kaspersky: Operation Triangulation: The last (hardware) mystery
This is no ordinary vulnerability, and we have many unanswered questions. We do not know how the attackers learned to use this unknown hardware feature or what its original purpose was. Neither do we know if it was developed by Apple or it’s a third-party component like ARM CoreSight.
#Comment Re: Deep iPhone exploit made: 2023-12-29 04:25:03.204406+01 by: Dan Lyke
(If anyone ever actually uses Webmention/indie-action to post here, please email me)
We will not edit your comments. However, we may delete your comments, or cause them to be hidden behind another link, if we feel they detract from the conversation. Commercial plugs are fine, if they are relevant to the conversation, and if you don't try to pretend to be a consumer. Annoying endorsements will be deleted if you're lucky, if you're not a whole bunch of people smarter and more articulate than you will ridicule you, and we will leave such ridicule in place.
Flutterby™ is a trademark claimed by
Dan Lyke for the web publications at www.flutterby.com and www.flutterby.net.