Hacker News new | past | comments | ask | show | jobs | submit login

I don’t know about the original claim either way, but I would be even more impressed and scared if it survived an iTunes restore (basically a PC reflashes the iPhone’s OS image with an image downloaded from Apple.)



If the malware controls the bootloader nothing will help: it can imitate any kind of restore, modifying the OS image on the fly


Apple has firmware restore features in ROM. I would also assume (hope?) that there’s a procedure to enter the ROM-based restore that is impossible to intercept in software (maybe holding the power button for 10 seconds initiates a hardware reset into the ROM.)


There is.


everything is signed.

should not be even remotely possible


Should. But we are talking about software vulnerabilities here. It means that things do not work as intended.


All code is signed on Apple’s platforms. Most exploits have a codesigning bypass of some sort.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: