Twitter Feed: Post

Twitter Feed

@joshbloch ("Joshua Bloch") retweeted:

@migueldeicaza ("Miguel “mask and vax” de Icaza") wrote:

This exploit is not the usual “we overwrote some memory”. They abuse a file format description to create a virtual machine out of a handful of logical operators to compute addresses at runtime and required its own compiler. This is wild.

with quote tweet:

@i41nbeer ("Ian Beer") wrote:

Today we're publishing a detailed technical writeup of FORCEDENTRY, the zero-click iMessage exploit linked by Citizen Lab to the exploitation of journalists,
activists and dissidents around the world. https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html