Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

They can, if they exploit an iOS vulnerability, as has been done many times in the past. Is this so different from using vulnerabilities to bypass a permission prompt?


Yes because on Android it’s much easier and also requires much less complicated/expensive exploits abuse including leveraging the users themselves.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: