TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Exploiting the Wi-Fi Stack on Apple Devices

347 pointsby archimag0over 7 years ago

10 comments

js2over 7 years ago
I&#x27;d love to know how many hours were needed to develop this exploit from start to finish, and how many dead ends the researcher ran into along the way.<p>Just writing the blog post and generating all the images for it must&#x27;ve taken many days.
评论 #15461969 未加载
评论 #15462816 未加载
pwinnskiover 7 years ago
This post is a thing of beauty. The details of how this works are amazing.
评论 #15462480 未加载
评论 #15463684 未加载
benzinschleuderover 7 years ago
Amazing. Did they need to jailbreak or physically open the phone to find all this stuff? They talk about reversing binary images and using their &quot;Legilimency&quot; toolkit; I wonder if a vanilla phone was enough to research all this and propagate through Wi-Fi.
评论 #15462246 未加载
walterbellover 7 years ago
Why did Apple make it harder to turn off the WiFi radio in iOS11?
评论 #15463969 未加载
评论 #15462762 未加载
评论 #15478906 未加载
lukehover 7 years ago
This is an incredible combination of both reverse engineering skill and communication ability. So good!
israrkhanover 7 years ago
These guys are amazing. Excellent level of details.
conchyover 7 years ago
Skimming through this makes me feel even more comfortable using my iPhone ... look how smart you need to be to exploit it!
mankash666over 7 years ago
Wonder if something like this was used to get into the San Bernardino shooter&#x27;s phone by the FBI
评论 #15461836 未加载
评论 #15464044 未加载
评论 #15462752 未加载
senatorobamaover 7 years ago
When will Apple dump Broadcom?
评论 #15463258 未加载
评论 #15463468 未加载
forapurposeover 7 years ago
What is the story with Project Zero? What is the strategy here?<p>If you think about it, pointing out flaws in competitors&#x27; products is actually unusual for businesses, especially large ones. It raises questions of motives, of trust (are they drumming up business in a negative way? Can I trust what company X says about their chief rival? Are they exaggerating or spinning it?), and it looks unsavory: You don&#x27;t win in the court of public opinion by insulting the competition, right or wrong; you just look like a jerk. Also, there&#x27;s a liability risk, which adds legal costs to otherwise free blog posts - &#x27;can&#x27;t you guys just find Linux bugs?&#x27;.<p>On the other hand, it might improve security for everyone if Apple and Google started competing to publicize each other&#x27;s flaws. :) (But I&#x27;d bet the noise of accusations and counter-accusations of errors in analysis, misleading statements, etc. would soon drown out the technical info, and then the lawsuits would begin ...).
评论 #15463900 未加载
评论 #15463215 未加载
评论 #15463201 未加载
评论 #15464309 未加载