this post was submitted on 30 Dec 2023
33 points (76.2% liked)

Technology

59390 readers
2712 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

In this video he discusses the TriangleDB attack chain that allowed hackers to completely compromise iPhones starting with a zero click exploit and ending with a bypass of Apples hardware based memory protection.

Read more about it from Kaspersky: https://securelist.com/triangledb-triangulation-implant/110050/

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 7 points 10 months ago

The distinction between an accidental bug, and the deliberate back door with plausible deniability is minuscule.

Unless you find the smoking gun document stating the reason for the code being written this way, there's always going to be deniability, it's always going to be pointed out as a bug.

But I think it's immaterial, even if every back door starts off as a genuine bug, code is so large and complex that there's going to be back doors to be harvested. And cataloged. And kept in reserve for advanced persistent threat actors