• 2 Posts
  • 31 Comments
Joined 2 years ago
cake
Cake day: July 2nd, 2023

help-circle





  • I get where this is coming from, and it’s good to move away from the libertarian fantasy that technology is neutral. But in practice, it is very hard to actually use.

    For example, you can’t use any GPL code that you may want to include, as that forces your project to also become GPL. And anyone using your code would also have to walk on eggshells for licensing, and they would probably just avoid it in the first place.

    It might be useful to some very specific end products, but this will likely not see a lot of adoption.















  • The exploit’s sophistication and the feature’s obscurity suggest the attackers had advanced technical capabilities

    exploiting a vulnerability in an undocumented hardware feature that few if anyone outside of Apple and chip suppliers such as ARM Holdings knew of.

    according to Russian officials also infected the iPhones of thousands of people working inside diplomatic missions and embassies in Russia

    the devices were infected with full-featured spyware that, among other things, transmitted microphone recordings, photos, geolocation, and other sensitive data to attacker-controlled servers

    Sounds like government espionage

    puts tinfoil hat on