@[email protected] to [email protected]English • 1 year ago4-year campaign backdoored iPhones using possibly the most advanced exploit everarstechnica.comexternal-linkmessage-square59fedilinkarrow-up1539arrow-down110
arrow-up1529arrow-down1external-link4-year campaign backdoored iPhones using possibly the most advanced exploit everarstechnica.com@[email protected] to [email protected]English • 1 year agomessage-square59fedilink
minus-square@[email protected]linkfedilinkEnglish15•1 year agoThere is no such thing as a device or software without exploit, even a carrier pigeon can be cought and the messege read.
minus-square@[email protected]linkfedilinkEnglish5•1 year agoThat’s it boys. We’ve found the answer. Pack it up
minus-square@[email protected]linkfedilinkEnglish6•1 year agoNot if you wirte the message using invisible ink.
minus-square@[email protected]linkfedilinkEnglish3•1 year agoI wouldn’t trust a service whose source code is not accessible though.
minus-square@[email protected]linkfedilinkEnglish-1•1 year agoWe may not have carrier pigeon DNA readily available, but it is certainly accessible!
There is no such thing as a device or software without exploit, even a carrier pigeon can be cought and the messege read.
What if the pigeon has a gun?
That’s it boys. We’ve found the answer. Pack it up
You are thinking of exploding penguins.
iGun patch incoming
Not if you wirte the message using invisible ink.
Not if you never write the message, more like
I wouldn’t trust a service whose source code is not accessible though.
We may not have carrier pigeon DNA readily available, but it is certainly accessible!