I’m not an Apple fan either. But focusing on the correct points is important.
Apple security is not complete as shown by their terribly insecure repair procedure.
Apple regularly blames users instead of admitting mistakes.
I agree with both of these points. However just shouting “iPhone security? LOL!” isn’t going to convince anyone because your argument is trivially dismissed. iPhones are competing with the best in class for security and this doesn’t show any flaw there.
I’m not an Apple fan either. But focusing on the correct points is important.
I agree with both of these points. However just shouting “iPhone security? LOL!” isn’t going to convince anyone because your argument is trivially dismissed. iPhones are competing with the best in class for security and this doesn’t show any flaw there.
https://github.com/secmob/TiYunZong-An-Exploit-Chain-to-Remotely-Root-Modern-Android-Devices/raw/master/us-20-Gong-TiYunZong-An-Exploit-Chain-to-Remotely-Root-Modern-Android-Devices.pdf
BlackHat Pwn2Own from the past recent years disagrees. See page 5.