return to table of content

4-year campaign backdoored iPhones using advanced exploit

mastercheif
1 replies
1d

Major kudos to Dan Goodin at Ars Technica for this write up. The article reads in a “progressive disclosure” manner, and I was able to follow along to the end even though I am not a programmer.

academia_hack
0 replies
14h28m

Dan's fantastic. Been interviewed by him in the past and was super impressed by his interest in understanding technical nuance and communicating the story accurately to a lay audience. He's definitely not a headline chaser like a lot of folks I've met in tech journalism. Ars is lucky to have him.

codedokode
1 replies
20h24m

I would like also to link an article with technical details of main exploit (memory protection bypass by using undocumented hadware GPU registers): https://securelist.com/operation-triangulation-the-last-hard...

hnburnsy
0 replies
15h59m

There is a series of articles on Operation Triangulation...

https://securelist.com/trng-2023/

dang
0 replies
14h45m

(Most) comments moved to:

Operation Triangulation: The last (hardware) mystery - https://news.ycombinator.com/item?id=38783112 - Dec 2023 (71 comments)

amai
0 replies
2h27m

See also the article from Ars Technica in June 2023: https://arstechnica.com/information-technology/2023/06/click...