Toot

Written by haui on 2024-09-19 at 19:26

I‘m not that bad at rhetoric either but I avoid it when I can.

Your argument is empty. Privilege escalation attacks are plain old cves that get found, evaluated and fixed. You need access to the phone, mostly in an unlocked state to get anything to work like that, same as with a computer.

I know a couple of pen testers and I would definitely know if there were large differences between operating systems securitywise.

=> More informations about this toot | View the thread | More toots from haui_lemmy@lemmy.giftedmc.com

Mentions

=> View Lemongrab@lemmy.one profile

Tags

Proxy Information
Original URL
gemini://mastogem.picasoft.net/toot/113165861391766851
Status Code
Success (20)
Meta
text/gemini
Capsule Response Time
557.598491 milliseconds
Gemini-to-HTML Time
0.29454 milliseconds

This content has been proxied by September (3851b).