Hacker News new | past | comments | ask | show | jobs | submit login

Does this mean that companies will now try to exploit the USB/Lightning driver to gain access?

The cat and mouse game continues.




I don't thin there would really be anything to exploit because it sounds like the data lines in the actual usb connection are turned off and only the power lines remain enabled to allow for charging.


But they're still disabled at a software level.


But how will you influence that said software if there's no way for you to talk to the device? This closes one exploitable avenue after 7 days - now attackers need to find something else.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: