Someone has publicly leaked an exploit kit that can hack millions of iPhones | TechCrunch
Leaked "DarkSword" exploits published to GitHub allow hackers and cybercriminals to target iPhone users running old versions of iOS with spyware, according to cybersecurity researchers.
"researchers" can go to extreme lengths to argue for and claim there are vulnerabilities in code, but yet almost none of them ever works on actually fixing the issue. Whatever the assessment of the issue is.
It’s single-recipient and single-shot AFAICT. I wonder why?
Security Developer’s Guide
The Java Cryptography Architecture (JCA) is a major piece of the platform, and contains a "provider" architecture and a set of APIs for digital signatures, message digests (hashes), certificates and certificate validation, encryption (symmetric/asymmetric block/stream ciphers), key generation and management, and secure random number generation, to name a few.
Does git actually verify hashes? What I mean is: if I use the “git” CLI to modify old commits then it will recompute the correct SHA1 and update everything. But if I just go and hack the data files directly and leave the hashes unchanged, will anything notice?