stopthatgirl7@kbin.social to Technology@lemmy.world · 10 months agoApple patches “clickless” 0-day image processing vulnerability in iOS, macOSarstechnica.comexternal-linkmessage-square13fedilinkarrow-up1173arrow-down10file-text
arrow-up1173arrow-down1external-linkApple patches “clickless” 0-day image processing vulnerability in iOS, macOSarstechnica.comstopthatgirl7@kbin.social to Technology@lemmy.world · 10 months agomessage-square13fedilinkfile-text
minus-squaremeseek #2982@lemmy.calinkfedilinkEnglisharrow-up13arrow-down1·edit-210 months agoEdit: turns out the flaw is exploited by way of an attachment that LM stops from loading. So in this case, LM would save you.
minus-squareKerfuffle@sh.itjust.workslinkfedilinkEnglisharrow-up6·10 months agoDoesn’t the article contradict what you just said? “We believe, and Apple’s Security Engineering and Architecture team has confirmed to us, that Lockdown Mode blocks this particular attack,” Citizen Lab said.
minus-squaremeseek #2982@lemmy.calinkfedilinkEnglisharrow-up6·10 months agoEdited. Still a sledgehammer approach imo.
Edit: turns out the flaw is exploited by way of an attachment that LM stops from loading. So in this case, LM would save you.
Doesn’t the article contradict what you just said?
“We believe, and Apple’s Security Engineering and Architecture team has confirmed to us, that Lockdown Mode blocks this particular attack,” Citizen Lab said.
Edited. Still a sledgehammer approach imo.