@[email protected] to [email protected]English • 6 months ago4-year campaign backdoored iPhones using possibly the most advanced exploit everarstechnica.comexternal-linkmessage-square59fedilinkarrow-up1543arrow-down110cross-posted to: privacy[email protected]
arrow-up1533arrow-down1external-link4-year campaign backdoored iPhones using possibly the most advanced exploit everarstechnica.com@[email protected] to [email protected]English • 6 months agomessage-square59fedilinkcross-posted to: privacy[email protected]
minus-square@[email protected]linkfedilinkEnglish17•6 months agoThere is no such thing as a device or software without exploit, even a carrier pigeon can be cought and the messege read.
minus-square@[email protected]linkfedilinkEnglish5•6 months agoThat’s it boys. We’ve found the answer. Pack it up
minus-square@[email protected]linkfedilinkEnglish2•6 months agoYou are thinking of exploding penguins.
minus-square@[email protected]linkfedilinkEnglish3•6 months agoI wouldn’t trust a service whose source code is not accessible though.
minus-square@ZinklinkEnglish-1•6 months agoWe may not have carrier pigeon DNA readily available, but it is certainly accessible!
There is no such thing as a device or software without exploit, even a carrier pigeon can be cought and the messege read.
What if the pigeon has a gun?
That’s it boys. We’ve found the answer. Pack it up
iGun patch incoming
You are thinking of exploding penguins.
Not if you wirte the message using invisible ink.
Not if you never write the message, more like
I wouldn’t trust a service whose source code is not accessible though.
We may not have carrier pigeon DNA readily available, but it is certainly accessible!