Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It also works if the target has installed an exploitable app, or one that can be trojaned via an included component. That sort of thing has happened in the past even from "reputable" software vendors (c.f. Lenovo/Superfish or the Sony rootkit), so pretending that it can't happen on App Store seems naive to me.

No, this isn't a remote root, but it's pretty severe and not something that should be downplayed with italics.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: