In this post, @laginimaneb describes the process of discovering and exploiting a vulnerability in Broadcom's firmware on iOS.
-
-
Show this thread
-
We also released the memory research platform for iOS that is described in Part 1 here:https://github.com/google/Legilimency/ …
Show this thread
End of conversation
New conversation -
-
-
Yeah so cool
End of conversation
New conversation -
-
I was about to be blind after read all of it at once , but ı have to say perfect work


-
Thank you!
End of conversation
New conversation -
-
-
THIS is a teaser: In the next blog post ... we’ll construct an over-the-air exploit allowing complete control over the iOS kernel.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
- 1 more reply
New conversation -
-
browsing Tor hidden services on Microsoft just became far from the tree.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.