In this video I discuss the TriangleDB attack chain that allowed hackers to completely compromise iPhones starting with a zero click exploit and ending with a bypass of Apples hardware based memory pr...

In this video he discusses the TriangleDB attack chain that allowed hackers to completely compromise iPhones starting with a zero click exploit and ending with a bypass of Apples hardware based memory protection.

Read more about it from Kaspersky: https://securelist.com/triangledb-triangulation-implant/110050/

@solrize@lemmy.world
link
fedilink
English
4010M

This is an astonishing attack but it has been all over the tech news already and is explained pretty well in the securelist post. I don’t have any desire to watch a video.

@poopkins@lemmy.world
link
fedilink
English
-110M

The video doesn’t go into the technical details about TriangleDB; that is left as a reference to the securelist article. Instead, the video discusses the background of the exploit, what has been done by others, what has been done since, and calls out some curiosities about the perpetrators.

I found the video to be a great summary and quite insightful.

@TCB13@lemmy.world
link
fedilink
English
2210M

So… can we now have decent untethered jailbreaks again?

Create a post

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


  • 1 user online
  • 186 users / day
  • 583 users / week
  • 1.37K users / month
  • 4.49K users / 6 months
  • 1 subscriber
  • 7.41K Posts
  • 84.7K Comments
  • Modlog