I‘m not that bad at rhetoric either but I avoid it when I can.
Your argument is empty. Privilege escalation attacks are plain old cves that get found, evaluated and fixed. You need access to the phone, mostly in an unlocked state to get anything to work like that, same as with a computer.
I know a couple of pen testers and I would definitely know if there were large differences between operating systems securitywise.
=> More informations about this toot | View the thread | More toots from haui_lemmy@lemmy.giftedmc.com
=> View Lemongrab@lemmy.one profile
text/gemini
This content has been proxied by September (3851b).