Pricefield | Lemmy
  • Communities
  • Create Post
  • Create Community
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
@[email protected]MB to Hacker [email protected] • 2 years ago

Operation Triangulation: What You Get When Attack iPhones of Researchers

securelist.com

external-link
message-square
0
fedilink
  • cross-posted to:
  • [email protected]
  • [email protected]
1
external-link

Operation Triangulation: What You Get When Attack iPhones of Researchers

securelist.com

@[email protected]MB to Hacker [email protected] • 2 years ago
message-square
0
fedilink
  • cross-posted to:
  • [email protected]
  • [email protected]
Operation Triangulation: The last (hardware) mystery
securelist.com
external-link
Recent iPhone models have additional hardware-based security protection for sensitive regions of the kernel memory. We discovered that to bypass this hardware-based security protection, the attackers used another hardware feature of Apple-designed SoCs.

HN Discussion

alert-triangle
You must log in or register to comment.

Hacker [email protected]

[email protected]
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: [email protected]

A mirror of Hacker News’ best submissions.

  • 1 user / day
  • 1 user / week
  • 1 user / month
  • 1 user / 6 months
  • 2 subscribers
  • 10.3K Posts
  • 2.76K Comments
  • Modlog
  • mods:
  • @[email protected]
  • UI: 0.18.4
  • BE: 0.18.2
  • Modlog
  • Instances
  • Docs
  • Code
  • join-lemmy.org