Watch as this is used for malware persistence through a code execution exploit. Then Apple will start verifying the file content.
If they were just video files, they wouldn't be such a vector for malware.
Watch as this is used for malware persistence through a code execution exploit. Then Apple will start verifying the file content.