Article 4P9JB A very deep dive into iOS Exploit chains found in the wild (Project Zero)

A very deep dive into iOS Exploit chains found in the wild (Project Zero)

by
corbet
from LWN.net on (#4P9JB)
It's not Linux but is worth a read: Google's Project Zero blog has ahighly detailed analysis of several iOS exploits and how they were usedto compromise large numbers of devices. "There's something thus far which is conspicuous only by its absence: is any of this encrypted? The short answer is no: they really do POST everything via HTTP (not HTTPS) and there is no asymmetric (or even symmetric) encryption applied to the data which is uploaded. Everything is in the clear. If you're connected to an unencrypted WiFi network this information is being broadcast to everyone around you, to your network operator and any intermediate network hops to the command and control server.This means that not only is the end-point of the end-to-end encryptionoffered by messaging apps compromised; the attackers then send all thecontents of the end-to-end encrypted messages in plain text over thenetwork to their server."
External Content
Source RSS or Atom Feed
Feed Location http://lwn.net/headlines/rss
Feed Title LWN.net
Feed Link https://lwn.net/
Reply 0 comments