@return2ozma@lemmy.world to Technology@lemmy.worldEnglish • 11 months ago4-year campaign backdoored iPhones using possibly the most advanced exploit everarstechnica.comexternal-linkmessage-square59fedilinkarrow-up1544arrow-down110cross-posted to: todayilearned@lemmit.onlineprivacy@programming.devtechnology@lemmy.ziphackernews@derp.foo
arrow-up1534arrow-down1external-link4-year campaign backdoored iPhones using possibly the most advanced exploit everarstechnica.com@return2ozma@lemmy.world to Technology@lemmy.worldEnglish • 11 months agomessage-square59fedilinkcross-posted to: todayilearned@lemmit.onlineprivacy@programming.devtechnology@lemmy.ziphackernews@derp.foo
minus-square@Tautvydaxx@lemmy.worldlinkfedilinkEnglish17•11 months agoThere is no such thing as a device or software without exploit, even a carrier pigeon can be cought and the messege read.
minus-square@thorbot@lemmy.worldlinkfedilinkEnglish5•11 months agoThat’s it boys. We’ve found the answer. Pack it up
minus-square@solrize@lemmy.worldlinkfedilinkEnglish2•11 months agoYou are thinking of exploding penguins.
minus-square@Tja@programming.devlinkfedilinkEnglish6•11 months agoNot if you wirte the message using invisible ink.
minus-square@EngineerGaming@feddit.nllinkfedilinkEnglish3•11 months agoI wouldn’t trust a service whose source code is not accessible though.
minus-square@Zink@programming.devlinkfedilinkEnglish-1•11 months agoWe may not have carrier pigeon DNA readily available, but it is certainly accessible!
There is no such thing as a device or software without exploit, even a carrier pigeon can be cought and the messege read.
What if the pigeon has a gun?
That’s it boys. We’ve found the answer. Pack it up
You are thinking of exploding penguins.
iGun patch incoming
Not if you wirte the message using invisible ink.
Not if you never write the message, more like
I wouldn’t trust a service whose source code is not accessible though.
We may not have carrier pigeon DNA readily available, but it is certainly accessible!