Exploited exploits: The missing details of the iPhone hack<article>
<section class="page">
<p>Another week, another opportunity to take a look at the lifecycle of an Apple catastrophe.</p><p>Last week, out of nothing more than sheer altruism, Google researchers dropped <a href="
https://www.wired.com/story/ios-attack-watering-hole-project-zero/" rel="nofollow">a bombshell report[/url]: certain websites have been indiscriminately hacking iPhones for two years by exploiting vulnerabilities in the operating system, hijacking passwords and even gaining the ability to read encrypted messages.</p><p>Not good. If you were concerned that no one would report on this, well, where have you been for 30 years?</p><p>Also, if you’ve been gone for 30 years, don’t… uh, don’t look at the news. Just… uh, just don’t.</p><p class="jumpTag"><a href="/article/3435578/exploited-exploits-the-missing-details-of-the-iphone-hack.html#jump">To read this article in full, please click here[/url]</p></section></article>
Source:
Exploited exploits: The missing details of the iPhone hack