Hacker News new | past | comments | ask | show | jobs | submit login

Well it could masquerade as a pair of EarPods and get access to the audio output yeah. But it still wouldn't get access to the iOS sync & backup/restore service (because normal EarPods have no reason to access that).



Not directly. But sending input masquerading as the vol up/dn and button on the EarPods is a potential attack surface.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: