Encrypt iPhone calls app
coderman
coderman at gmail.com
Fri Aug 1 07:46:42 PDT 2014
On Fri, Aug 1, 2014 at 2:34 AM, stef <s at ctrlc.hu> wrote:
> ...
> so is your statement consistent with: http://www.zdziarski.com/blog/?p=3441
mobile is in bad shape,
- http://labs.bromium.com/2014/07/31/remote-code-execution-on-android-devices/
- http://www.wired.com/2014/07/hackers-can-control-your-phone-using-a-tool-thats-already-built-into-it/
if anything ever needed giant sandboxes it is mobile, yet expediency
trumps and my yearning for seL4 VT-d ARMs pines ever onward...
the most effective, persistent, stealthy mobile attacks do leverage
IS-* arcana, so perhaps that alone deserving of "very powerful
adversary". (a sick fuck reads IS-3, IS-91, IS-54, IS-136, IS-856,
IS-2000, E-UTRA)
best regards,
More information about the cypherpunks
mailing list