Hah, it was rhetorical, it's not common at all. This kind of minor inconvenience happens literally all the time, some patch breaks some technique - exploitation still continues, attackers simply adjust.
That's excellent, please describe this scenario? The scenario you've come up with so far is "Attacker *only* wanted some data that doesn't exist yet, won't exist before they reboot their phone next, nothing else of value available and attack is only possible once for some reason"
-
-
Evil maid targeting Android vuln that requires physical access, with objective of recording a future phone call. (Not to say there isn't anything else of value, but let's say primary objective is recording a specific future call.) Feel free to ask TAG for more examples :)
-
Right, here are the contrivances: Attacker only has one possible objective, and can't simply pivot to something else. Attacker only has one opportunity, can't just do it again. People don't reboot their phones (I reboot mine once a month for patches).
- 10 more replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.