Hacker News new | past | comments | ask | show | jobs | submit login

Does anyone know to what extent this compromises the device? I might have missed it, but didn’t see it explained in the article. Does the attacker get full access to the device, or do they only compromise a subset of the devices functionality?



They say at the top that the exploit can install Pegasus, so probably some or all of Pegasus's functionality. That doesn't really narrow it down, but it likely can constantly run in the background, use the sensors, read texts, and send info over the internet at least.


Doesn’t a reboot of the phone “fix” this?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: