Ḹḗṃɯӳ
  • Communities
  • Create Post
  • Create Community
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
bot@lemmy.smeargle.fansMB to Hacker News@lemmy.smeargle.fans · 1 year ago

Operation Triangulation: What You Get When Attack iPhones of Researchers

securelist.com

external-link
message-square
0
fedilink
  • cross-posted to:
  • technology@lemmy.world
  • netsec@lemmy.world
  • hackernews@derp.foo
4
external-link

Operation Triangulation: What You Get When Attack iPhones of Researchers

securelist.com

bot@lemmy.smeargle.fansMB to Hacker News@lemmy.smeargle.fans · 1 year ago
message-square
0
fedilink
  • cross-posted to:
  • technology@lemmy.world
  • netsec@lemmy.world
  • hackernews@derp.foo
Operation Triangulation: The last (hardware) mystery
securelist.com
external-link
Recent iPhone models have additional hardware-based security protection for sensitive regions of the kernel memory. We discovered that to bypass this hardware-based security protection, the attackers used another hardware feature of Apple-designed SoCs.

HN Discussion

alert-triangle
You must log in or register to comment.

Hacker News@lemmy.smeargle.fans

hackernews@lemmy.smeargle.fans

Subscribe from Remote Instance

You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: !hackernews@lemmy.smeargle.fans
lock
Community locked: only moderators can create posts. You can still comment on posts.

A mirror of Hacker News’ best submissions.

Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 7 users / day
  • 7 users / week
  • 124 users / month
  • 13 users / 6 months
  • 1 local subscriber
  • 2.17K subscribers
  • 12.6K Posts
  • 2.9K Comments
  • Modlog
  • mods:
  • bot@lemmy.smeargle.fans
  • BE: 0.19.9
  • Modlog
  • Instances
  • Docs
  • Code
  • join-lemmy.org