In this video I discuss the TriangleDB attack chain that allowed hackers to completely compromise iPhones starting with a zero click exploit and ending with a bypass of Apples hardware based memory pr...
In this video he discusses the TriangleDB attack chain that allowed hackers to completely compromise iPhones starting with a zero click exploit and ending with a bypass of Apples hardware based memory protection.
This is an astonishing attack but it has been all over the tech news already and is explained pretty well in the securelist post. I don't have any desire to watch a video.
The video doesn't go into the technical details about TriangleDB; that is left as a reference to the securelist article. Instead, the video discusses the background of the exploit, what has been done by others, what has been done since, and calls out some curiosities about the perpetrators.
I found the video to be a great summary and quite insightful.
The distinction between an accidental bug, and the deliberate back door with plausible deniability is minuscule.
Unless you find the smoking gun document stating the reason for the code being written this way, there's always going to be deniability, it's always going to be pointed out as a bug.
But I think it's immaterial, even if every back door starts off as a genuine bug, code is so large and complex that there's going to be back doors to be harvested. And cataloged. And kept in reserve for advanced persistent threat actors