Hacker News new | past | comments | ask | show | jobs | submit login

I assume it takes time to go from "this person could have potentially been targeted with Pegasus" to "this person's iPhone was exploited by Pegasus, and here is how they did it."



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: