At #36c3, Google Project Zero’s @5aelo talking about 0 click iOS iMessage exploitpic.twitter.com/Q5VBGzLyr8
U tweetove putem weba ili aplikacija drugih proizvođača možete dodati podatke o lokaciji, kao što su grad ili točna lokacija. Povijest lokacija tweetova uvijek možete izbrisati. Saznajte više
To block 0-click attacks, Apple could provide an option to block iMessages from unknown senders. Threema has this #36c3
Google didn’t get any sort of reward from Apple for disclosing this attack, but adds Google didn’t ask for one either #36c3
[Thought from me: if you are worried about this sort of thing, don’t stay logged into iMessage. The exploit can’t be delivered if iMessage isn’t running on your phone, although it’s enabled by default] #36c3
Apple’s server is not going to see an exploit being delivered because of end to end encryption, so mitigations are really going to need to be on the device #36c3
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.