• kibiz0r@midwest.social
    link
    fedilink
    English
    arrow-up
    26
    arrow-down
    2
    ·
    edit-2
    6 months ago

    Comments here: “Yeah right, I’ll believe it when they explain how.”

    Article: literally has a section explaining how

    Edit:

    Replies: “Yeah, but that’s just a summary. I’ll believe it when they explain in full detail.”

    Article: literally has a link to the detailed explanation

    • AProfessional@lemmy.world
      link
      fedilink
      English
      arrow-up
      16
      arrow-down
      2
      ·
      edit-2
      6 months ago

      The claim is they completely bypass all Android and iOS security is pretty unbelievable.

      If so then the real discussion is how these zero day exploits are just sitting around.

      EDIT: It seems the focus is on Android but all the information is nonsensical, like AI generated buzzword bingo.

        • AProfessional@lemmy.world
          link
          fedilink
          English
          arrow-up
          5
          ·
          edit-2
          6 months ago

          That source looks better indeed.

          Ars quotes nonsense like “bypasses the security” and “exploit the user”.

          Those terms have meaning and they aren’t applicable here.

          At the end though they do say things like

          is able to hack your phone from the moment you install the app

          Without any credible evidence.

    • TORFdot0@lemmy.world
      link
      fedilink
      English
      arrow-up
      9
      arrow-down
      1
      ·
      6 months ago

      It states that it’s somehow breaking the permissions sandbox by dynamically recompiling code after the app is opened. Unless there is some undisclosed exploit that it’s using to break the sandbox, it’s outside most people’s understanding of how these platforms work