Pricefield | Lemmy
  • Communities
  • Create Post
  • Create Community
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
@[email protected]MB to Hacker [email protected]English • 2 years ago

Operation Triangulation: What You Get When Attack iPhones of Researchers

securelist.com

external-link
message-square
0
fedilink
  • cross-posted to:
  • [email protected]
  • [email protected]
9
external-link

Operation Triangulation: What You Get When Attack iPhones of Researchers

securelist.com

@[email protected]MB to Hacker [email protected]English • 2 years ago
message-square
0
fedilink
  • cross-posted to:
  • [email protected]
  • [email protected]
Operation Triangulation: The last (hardware) mystery
securelist.com
external-link
Recent iPhone models have additional hardware-based security protection for sensitive regions of the kernel memory. We discovered that to bypass this hardware-based security protection, the attackers used another hardware feature of Apple-designed SoCs.

There is a discussion on Hacker News, but feel free to comment here as well.

alert-triangle
You must log in or register to comment.

Hacker [email protected]

[email protected]
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: [email protected]

This community serves to share top posts on Hacker News with the wider fediverse.

Rules
  1. Keep it legal
  2. Keep it civil and SFW
  3. Keep it safe for members of marginalised groups
  • 1 user / day
  • 1 user / week
  • 1 user / month
  • 1 user / 6 months
  • 1 subscriber
  • 16K Posts
  • 10.3K Comments
  • Modlog
  • mods:
  • @[email protected]
  • UI: 0.18.4
  • BE: 0.18.2
  • Modlog
  • Instances
  • Docs
  • Code
  • join-lemmy.org