Hacker Newsnew | past | comments | ask | show | jobs | submit | brainzap's commentslogin

you can observe Microsoft Gaming fall apart over the next 12 month.

I am shocked to hear that over these years it was possibl to extract data from a locked iphone. (hardening mode off)

I trusted apple.


>I trusted apple.

To what? Write 100% bug free software? I don't think that's actually achievable, and expecting so is just setting yourself up for appointment. Apple does a better job than most other vendors except maybe GrapheneOS. Mainstream Android vendors are far worse. Here's Cellebrite Premium's support matrix from July 2024, for locked devices. iPhones are vulnerable after first unlock (AFU), but Androids are even worse. They can be hacked even if they have been shut down/rebooted.

https://grapheneos.social/system/media_attachments/files/112...

https://grapheneos.social/system/media_attachments/files/112...

https://grapheneos.social/system/media_attachments/files/112...


These links working for anyone? 403 for me

Updated the links. The original were from discuss.grapheneos.org but it looks like they don't like hot-linking.

Qubes OS does a much better job though, because it relies on security through compartmentalization, not security through correctness.

The problem with that is it runs on a desktop, which means very little in the way of protection against physical attacks. You might be safe from Mossad trying to hack you from half way across the world, but you're not safe from someone doing an evil maid attack, or from seizing it and bruteforcing the FDE password (assuming you didn't set a 20 random character password).

TPM with Heads protects my laptop from such attacks just fine. All based on FLOSS.

> assuming you didn't set a 20 random character password

It doesn't have to be all random characters for good protection.


If someone puts passwords shorter than 30 characters on their devices, then everything that happens to them is their own fault.

This is a newly-discovered vulnerability (CVE-2026-20700, addressed along with CVE-2025-14174 and CVE-2025-43529).

Note that the description "an attacker with memory write capability may be able to execute arbitrary code" implies that this CVE is a step in a complex exploit chain. In other words, it's not a "grab a locked iPhone and bypass the passcode" vulnerability.


I may well be missing something, but this reads to me as code execution on user action, not lock bypass.

Like, you couldn’t get a locked phone that hadn’t already been compromised to do anything because it would be locked so you’d have no way to run the code that triggers the compromise.

Am I not interpreting things correctly?

[edit: ah, I guess “An attacker with memory write capability” might cover attackers with physical access to the device and external hardware attached to its circuit board that can write to the memory directly?]


No your original analysis is fine

I think its cool, so I can who is in the office for lunch.

Currently I manually check device IPs.


And there's me asking people :/


friendships are strengthed by shared hard and painful experiences. online friendships just don't feel the same


When I got a steamdeck I open excel and started playtesting a few games, to many bugs, so I sold it


sadly cheating software can be found on github, easy to install. for example https://github.com/sohzm/cheating-daddy


What's sad about it? Why should it be censored?


it is called activation energy, sometimes a new technology needs to be created to get the ball rolling


oh no


this, our helm charts are flat and for year only passed in the image as variable


too much microsoft


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: