View Single Post
Old 10-23-2015, 09:50 PM   #179
knc1
Going Viral
knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.knc1 ought to be getting tired of karma fortunes by now.
 
knc1's Avatar
 
Posts: 17,212
Karma: 18210809
Join Date: Feb 2012
Location: Central Texas
Device: No K1, PW2, KV, KOA
Quote:
Originally Posted by Rizla View Post
Out of interest, how does the hack represent a threat? Presumably the hack can only be used by a user on their own device. Would it possible for a hacker to access someone else's device?
The full answer should be obvious in a week's time.
But consider what has to happen to install our developer's signature certificate; execution of arbitrary code with 'root' privileges. Never a nice thing on any computer system.

For instance, the 2012 vulnerability was not under the user's control, which is why it could represent a threat. (See links above for details of that one).

Last edited by knc1; 10-23-2015 at 09:58 PM.
knc1 is offline   Reply With Quote