@divested @lhn
Why did Wired write a long article about this promoting Palantir and iVerify by making a massive deal out of something they say requires an attacker to have physical access to the device and the lock method? If they have that, they already have control over the device and can simply install whatever apps they want and grant them any available permissions. They can extract nearly all the data via the backup system. It's not surprising it was treated as barely being a real issue.
=> More informations about this toot | View the thread | More toots from GrapheneOS@grapheneos.social
=> View divested@infosec.exchange profile | View lhn@mastodon.online profile
text/gemini
This content has been proxied by September (3851b).