|
@5aelo | |||||
|
I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage: googleprojectzero.blogspot.com/2020/01/remote…
|
||||||
|
||||||
|
Samuel Groß
@5aelo
|
9. sij |
|
The README and various code comments hopefully also help explain how the PoC exploit works: bugs.chromium.org/p/project-zero… and also twitter.com/5aelo/status/1…
|
||
|
|
||
|
Sam Hanson
@secureloon
|
11. sij |
|
Looks awesome!
Your research into JavaScript engine exploits played a large part in my groups research for my grad-level computer security class.
We got an A.
Thanks for your hard work!
|
||
|
|
||
|
Samuel Groß
@5aelo
|
12. sij |
|
Great to hear, thanks! :)
|
||
|
|
||
|
Freedom iDevice #Checkra1nLinux!
@iS4ndb0x
|
9. sij |
|
What is this
|
||
|
|
||
|
#WeAlliPhoneFamily
@iM4CH3T3
|
10. sij |
|
Blogpost about multiple iMessage bugs combined In an attack. Fixed in iOS 12.4.1
|
||
|
|
||
|
Cedric Halbronn
@saidelike
|
9. sij |
|
Nice. Is that what you will be presenting at offensivecon too?
|
||
|
|
||
|
Dan Henderson
@justdanh
|
10. sij |
|
Excellent (and terrifying) post!
|
||
|
|
||
|
Jovonni
@Jovonni
|
10. sij |
|
@klmitchell212 peep
|
||
|
|
||
|
James Willy
@james0x40
|
10. sij |
|
always you! very creative...
|
||
|
|
||
|
Jonathan Fritz
@jonathanfritz_
|
10. sij |
|
Thank you! I enjoyed your talk at #36c3
|
||
|
|
||