Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. Other Discussions
  3. The Insider News
  4. iPhone Triangulation attack abused undocumented hardware feature

iPhone Triangulation attack abused undocumented hardware feature

Scheduled Pinned Locked Moved The Insider News
ioscomhardwaresecurityannouncement
3 Posts 3 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • K Offline
    K Offline
    Kent Sharkey
    wrote on last edited by
    #1

    Bleeping Computer[^]:

    The Operation Triangulation spyware attacks targeting iPhone devices since 2019 leveraged undocumented features in Apple chips to bypass hardware-based security protections.

    Why undocumented features is bad: iPhone edition

    Richard Andrew x64R O 2 Replies Last reply
    0
    • K Kent Sharkey

      Bleeping Computer[^]:

      The Operation Triangulation spyware attacks targeting iPhone devices since 2019 leveraged undocumented features in Apple chips to bypass hardware-based security protections.

      Why undocumented features is bad: iPhone edition

      Richard Andrew x64R Offline
      Richard Andrew x64R Offline
      Richard Andrew x64
      wrote on last edited by
      #2

      Amazing that, given how good Apple is at keeping their products secret.

      The difficult we do right away... ...the impossible takes slightly longer.

      1 Reply Last reply
      0
      • K Kent Sharkey

        Bleeping Computer[^]:

        The Operation Triangulation spyware attacks targeting iPhone devices since 2019 leveraged undocumented features in Apple chips to bypass hardware-based security protections.

        Why undocumented features is bad: iPhone edition

        O Offline
        O Offline
        obermd
        wrote on last edited by
        #3

        I got a real chuckle out of the FSB's accusation against Apple and the NSA when the Chinese are just as likely to have discovered these flaws and have actively been using them against Russia. Not saying the NSA isn't using it but that the Chinese are just as likely to use it.

        1 Reply Last reply
        0
        Reply
        • Reply as topic
        Log in to reply
        • Oldest to Newest
        • Newest to Oldest
        • Most Votes


        • Login

        • Don't have an account? Register

        • Login or register to search.
        • First post
          Last post
        0
        • Categories
        • Recent
        • Tags
        • Popular
        • World
        • Users
        • Groups