Toot

Written by GrapheneOS on 2024-08-15 at 17:30

@divested @lhn

Why did Wired write a long article about this promoting Palantir and iVerify by making a massive deal out of something they say requires an attacker to have physical access to the device and the lock method? If they have that, they already have control over the device and can simply install whatever apps they want and grant them any available permissions. They can extract nearly all the data via the backup system. It's not surprising it was treated as barely being a real issue.

=> More informations about this toot | View the thread | More toots from GrapheneOS@grapheneos.social

Mentions

=> View divested@infosec.exchange profile | View lhn@mastodon.online profile

Tags

Proxy Information
Original URL
gemini://mastogem.picasoft.net/toot/112967223367633160
Status Code
Success (20)
Meta
text/gemini
Capsule Response Time
225.835151 milliseconds
Gemini-to-HTML Time
0.478425 milliseconds

This content has been proxied by September (3851b).