stopthatgirl7@kbin.social to Technology@lemmy.world · 2 years agoApple patches “clickless” 0-day image processing vulnerability in iOS, macOSarstechnica.comexternal-linkmessage-square12fedilinkarrow-up1177file-textcross-posted to: tech@kbin.socialapple@kbin.social
arrow-up1177external-linkApple patches “clickless” 0-day image processing vulnerability in iOS, macOSarstechnica.comstopthatgirl7@kbin.social to Technology@lemmy.world · 2 years agomessage-square12fedilinkfile-textcross-posted to: tech@kbin.socialapple@kbin.social
minus-squaremeseek #2982@lemmy.calinkfedilinkEnglisharrow-up13·edit-22 years agoEdit: turns out the flaw is exploited by way of an attachment that LM stops from loading. So in this case, LM would save you.
minus-squareKerfuffle@sh.itjust.workslinkfedilinkEnglisharrow-up6·2 years agoDoesn’t the article contradict what you just said? “We believe, and Apple’s Security Engineering and Architecture team has confirmed to us, that Lockdown Mode blocks this particular attack,” Citizen Lab said.
minus-squaremeseek #2982@lemmy.calinkfedilinkEnglisharrow-up6·2 years agoEdited. Still a sledgehammer approach imo.
Edit: turns out the flaw is exploited by way of an attachment that LM stops from loading. So in this case, LM would save you.
Doesn’t the article contradict what you just said?
“We believe, and Apple’s Security Engineering and Architecture team has confirmed to us, that Lockdown Mode blocks this particular attack,” Citizen Lab said.
Edited. Still a sledgehammer approach imo.