Quote:
Originally Posted by Rizla
Out of interest, how does the hack represent a threat? Presumably the hack can only be used by a user on their own device. Would it possible for a hacker to access someone else's device?
|
The full answer should be obvious in a week's time.

But consider what has to happen to install our developer's signature certificate; execution of arbitrary code with 'root' privileges. Never a nice thing on any computer system.
For instance, the 2012 vulnerability was not under the user's control, which is why it could represent a threat. (See links above for details of that one).