4-year campaign backdoored iPhones using possibly the most advanced exploit everreturn2ozma@lemmy.world to Technology@lemmy.world – 526 points – 9 months agoarstechnica.com56Post a CommentPreviewYou are viewing a single commentView all commentsShow the parent commentThere is no such thing as a device or software without exploit, even a carrier pigeon can be cought and the messege read.Not if you wirte the message using invisible ink.Not if you never write the message, more likeI wouldn't trust a service whose source code is not accessible though.We may not have carrier pigeon DNA readily available, but it is certainly accessible!4 more...
There is no such thing as a device or software without exploit, even a carrier pigeon can be cought and the messege read.Not if you wirte the message using invisible ink.Not if you never write the message, more likeI wouldn't trust a service whose source code is not accessible though.We may not have carrier pigeon DNA readily available, but it is certainly accessible!4 more...
I wouldn't trust a service whose source code is not accessible though.We may not have carrier pigeon DNA readily available, but it is certainly accessible!
There is no such thing as a device or software without exploit, even a carrier pigeon can be cought and the messege read.
Not if you wirte the message using invisible ink.
Not if you never write the message, more like
I wouldn't trust a service whose source code is not accessible though.
We may not have carrier pigeon DNA readily available, but it is certainly accessible!