Hacker News new | past | comments | ask | show | jobs | submit login

Generally speaking, most of the "exploits" I've seen so far have fallen into the mundane category of "if you have full access to the computer/device, you can inject code into target applications to exfiltrate information". This is more of a demonstration of the platform's security than of any specific application -- if you can get the user to run code, all bets are off.

For what it's worth, iOS has come out of this looking very safe. The CIA is essentially riding on the coattails of jailbreaks, which have been getting increasingly rare.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: