In this video I discuss the TriangleDB attack chain that allowed hackers to completely compromise iPhones starting with a zero click exploit and ending with a bypass of Apples hardware based memory pr...
In this video he discusses the TriangleDB attack chain that allowed hackers to completely compromise iPhones starting with a zero click exploit and ending with a bypass of Apples hardware based memory protection.
This is an astonishing attack but it has been all over the tech news already and is explained pretty well in the securelist post. I don't have any desire to watch a video.
The video doesn't go into the technical details about TriangleDB; that is left as a reference to the securelist article. Instead, the video discusses the background of the exploit, what has been done by others, what has been done since, and calls out some curiosities about the perpetrators.
I found the video to be a great summary and quite insightful.