return2ozma@lemmy.world to Technology@lemmy.worldEnglish · 1 year ago4-year campaign backdoored iPhones using possibly the most advanced exploit everarstechnica.comexternal-linkmessage-square57fedilinkarrow-up1540arrow-down19
arrow-up1531arrow-down1external-link4-year campaign backdoored iPhones using possibly the most advanced exploit everarstechnica.comreturn2ozma@lemmy.world to Technology@lemmy.worldEnglish · 1 year agomessage-square57fedilink
minus-squareTautvydaxx@lemmy.worldlinkfedilinkEnglisharrow-up17·1 year agoThere is no such thing as a device or software without exploit, even a carrier pigeon can be cought and the messege read.
minus-squareExLisper@linux.communitylinkfedilinkEnglisharrow-up9·1 year agoWhat if the pigeon has a gun?
minus-squarewoodenskewer@lemmy.worldlinkfedilinkEnglisharrow-up3arrow-down1·1 year agoiGun patch incoming
minus-squaresolrize@lemmy.worldlinkfedilinkEnglisharrow-up3arrow-down1·1 year agoYou are thinking of exploding penguins.
minus-squareTja@programming.devlinkfedilinkEnglisharrow-up7arrow-down1·1 year agoNot if you wirte the message using invisible ink.
minus-squarelad@programming.devlinkfedilinkEnglisharrow-up1·1 year agoNot if you never write the message, more like
minus-squareEngineerGaming@feddit.nllinkfedilinkEnglisharrow-up3·1 year agoI wouldn’t trust a service whose source code is not accessible though.
minus-squareZink@programming.devlinkfedilinkEnglisharrow-up2arrow-down3·1 year agoWe may not have carrier pigeon DNA readily available, but it is certainly accessible!
There is no such thing as a device or software without exploit, even a carrier pigeon can be cought and the messege read.
What if the pigeon has a gun?
deleted by creator
iGun patch incoming
You are thinking of exploding penguins.
Not if you wirte the message using invisible ink.
Not if you never write the message, more like
I wouldn’t trust a service whose source code is not accessible though.
We may not have carrier pigeon DNA readily available, but it is certainly accessible!