Encrypt iPhone calls app

coderman coderman at gmail.com
Fri Aug 1 07:46:42 PDT 2014


On Fri, Aug 1, 2014 at 2:34 AM, stef <s at ctrlc.hu> wrote:
> ...
> so is your statement consistent with: http://www.zdziarski.com/blog/?p=3441

mobile is in bad shape,
 - http://labs.bromium.com/2014/07/31/remote-code-execution-on-android-devices/
 - http://www.wired.com/2014/07/hackers-can-control-your-phone-using-a-tool-thats-already-built-into-it/

if anything ever needed giant sandboxes it is mobile, yet expediency
trumps and my yearning for seL4 VT-d ARMs pines ever onward...

the most effective, persistent, stealthy mobile attacks do leverage
IS-* arcana, so perhaps that alone deserving of "very powerful
adversary". (a sick fuck reads IS-3, IS-91, IS-54, IS-136, IS-856,
IS-2000, E-UTRA)


best regards,



More information about the cypherpunks mailing list