1 Aug
2014
1 Aug
'14
2:46 p.m.
On Fri, Aug 1, 2014 at 2:34 AM, stef <s@ctrlc.hu> wrote:
... so is your statement consistent with: http://www.zdziarski.com/blog/?p=3441
mobile is in bad shape, - http://labs.bromium.com/2014/07/31/remote-code-execution-on-android-devices/ - http://www.wired.com/2014/07/hackers-can-control-your-phone-using-a-tool-tha... if anything ever needed giant sandboxes it is mobile, yet expediency trumps and my yearning for seL4 VT-d ARMs pines ever onward... the most effective, persistent, stealthy mobile attacks do leverage IS-* arcana, so perhaps that alone deserving of "very powerful adversary". (a sick fuck reads IS-3, IS-91, IS-54, IS-136, IS-856, IS-2000, E-UTRA) best regards,