@divested @lhn
"This means that an attacker would first need to turn the application on in a target's device before being able to exploit it. The most straightforward way to do this would involve having physical access to a victim's phone as well as their system password or another exploitable vulnerability that would allow them to make changes to settings."
=> More informations about this toot | View the thread | More toots from GrapheneOS@grapheneos.social
=> View divested@infosec.exchange profile | View lhn@mastodon.online profile
text/gemini
This content has been proxied by September (3851b).