return2ozma@lemmy.world to Technology@lemmy.worldEnglish · 2 years ago4-year campaign backdoored iPhones using possibly the most advanced exploit everarstechnica.comexternal-linkmessage-square57fedilinkarrow-up1540arrow-down19
arrow-up1531arrow-down1external-link4-year campaign backdoored iPhones using possibly the most advanced exploit everarstechnica.comreturn2ozma@lemmy.world to Technology@lemmy.worldEnglish · 2 years agomessage-square57fedilink
minus-squareTautvydaxx@lemmy.worldlinkfedilinkEnglisharrow-up17·2 years agoThere is no such thing as a device or software without exploit, even a carrier pigeon can be cought and the messege read.
minus-squareExLisper@linux.communitylinkfedilinkEnglisharrow-up9·2 years agoWhat if the pigeon has a gun?
minus-squarewoodenskewer@lemmy.worldlinkfedilinkEnglisharrow-up3arrow-down1·2 years agoiGun patch incoming
minus-squaresolrize@lemmy.worldlinkfedilinkEnglisharrow-up3arrow-down1·2 years agoYou are thinking of exploding penguins.
minus-squareTja@programming.devlinkfedilinkEnglisharrow-up7arrow-down1·2 years agoNot if you wirte the message using invisible ink.
minus-squarelad@programming.devlinkfedilinkEnglisharrow-up1·2 years agoNot if you never write the message, more like
minus-squareEngineerGaming@feddit.nllinkfedilinkEnglisharrow-up3·2 years agoI wouldn’t trust a service whose source code is not accessible though.
minus-squareZink@programming.devlinkfedilinkEnglisharrow-up2arrow-down3·2 years agoWe may not have carrier pigeon DNA readily available, but it is certainly accessible!
There is no such thing as a device or software without exploit, even a carrier pigeon can be cought and the messege read.
What if the pigeon has a gun?
deleted by creator
iGun patch incoming
You are thinking of exploding penguins.
Not if you wirte the message using invisible ink.
Not if you never write the message, more like
I wouldn’t trust a service whose source code is not accessible though.
We may not have carrier pigeon DNA readily available, but it is certainly accessible!