stopthatgirl7@kbin.social to Technology@lemmy.world · 1 year agoApple patches “clickless” 0-day image processing vulnerability in iOS, macOSarstechnica.comexternal-linkmessage-square12fedilinkarrow-up1177arrow-down10file-text
arrow-up1177arrow-down1external-linkApple patches “clickless” 0-day image processing vulnerability in iOS, macOSarstechnica.comstopthatgirl7@kbin.social to Technology@lemmy.world · 1 year agomessage-square12fedilinkfile-text
minus-squaremeseek #2982@lemmy.calinkfedilinkEnglisharrow-up13arrow-down1·edit-21 year agoEdit: turns out the flaw is exploited by way of an attachment that LM stops from loading. So in this case, LM would save you.
minus-squareKerfuffle@sh.itjust.workslinkfedilinkEnglisharrow-up6·1 year agoDoesn’t the article contradict what you just said? “We believe, and Apple’s Security Engineering and Architecture team has confirmed to us, that Lockdown Mode blocks this particular attack,” Citizen Lab said.
minus-squaremeseek #2982@lemmy.calinkfedilinkEnglisharrow-up6·1 year agoEdited. Still a sledgehammer approach imo.
Edit: turns out the flaw is exploited by way of an attachment that LM stops from loading. So in this case, LM would save you.
Doesn’t the article contradict what you just said?
“We believe, and Apple’s Security Engineering and Architecture team has confirmed to us, that Lockdown Mode blocks this particular attack,” Citizen Lab said.
Edited. Still a sledgehammer approach imo.