Operation Triangulation: What You Get When Attack iPhones of Researchers
https://securelist.com/operation-triangulation-the-last-hardware-mystery/111669/
#ycombinator #Apple #Malware_Technologies #Reverse_engineering #Targeted_attacks #Triangulation #Vulnerabilities_and_exploits #Zero_day_vulnerabilities
https://securelist.com/operation-triangulation-the-last-hardware-mystery/111669/
#ycombinator #Apple #Malware_Technologies #Reverse_engineering #Targeted_attacks #Triangulation #Vulnerabilities_and_exploits #Zero_day_vulnerabilities
Operation Triangulation: The last (hardware) mystery
Recent iPhone models have additional hardware-based security protection for sensitive regions of the kernel memory. We discovered that to bypass this hardware-based security protection, the attackers used another hardware feature of Apple-designed SoCs.
Hacker News