return2ozma@lemmy.world to Technology@lemmy.worldEnglish · 11 months ago4-year campaign backdoored iPhones using possibly the most advanced exploit everarstechnica.comexternal-linkmessage-square58fedilinkarrow-up1534arrow-down110
arrow-up1524arrow-down1external-link4-year campaign backdoored iPhones using possibly the most advanced exploit everarstechnica.comreturn2ozma@lemmy.world to Technology@lemmy.worldEnglish · 11 months agomessage-square58fedilink
minus-squareTautvydaxx@lemmy.worldlinkfedilinkEnglisharrow-up16·11 months agoThere is no such thing as a device or software without exploit, even a carrier pigeon can be cought and the messege read.
minus-squareExLisper@linux.communitylinkfedilinkEnglisharrow-up8·11 months agoWhat if the pigeon has a gun?
minus-squaresolrize@lemmy.worldlinkfedilinkEnglisharrow-up3·11 months agoYou are thinking of exploding penguins.
minus-squareTja@programming.devlinkfedilinkEnglisharrow-up7·11 months agoNot if you wirte the message using invisible ink.
minus-squarelad@programming.devlinkfedilinkEnglisharrow-up1·11 months agoNot if you never write the message, more like
minus-squareEngineerGaming@feddit.nllinkfedilinkEnglisharrow-up3·11 months agoI wouldn’t trust a service whose source code is not accessible though.
minus-squareZink@programming.devlinkfedilinkEnglisharrow-up2arrow-down2·11 months agoWe may not have carrier pigeon DNA readily available, but it is certainly accessible!
There is no such thing as a device or software without exploit, even a carrier pigeon can be cought and the messege read.
What if the pigeon has a gun?
iGun patch incoming
You are thinking of exploding penguins.
Not if you wirte the message using invisible ink.
Not if you never write the message, more like
I wouldn’t trust a service whose source code is not accessible though.
We may not have carrier pigeon DNA readily available, but it is certainly accessible!