@joshbloch ("Joshua Bloch") retweeted:
@migueldeicaza ("Miguel “mask and vax” de Icaza") wrote:
This exploit is not the usual “we overwrote some memory”. They abuse a file format description to create a virtual machine out of a handful of logical operators to compute addresses at runtime and required its own compiler. This is wild.
with quote tweet:
Today we're publishing a detailed technical writeup of FORCEDENTRY, the zero-click iMessage exploit linked by Citizen Lab to the exploitation of journalists,
activists and dissidents around the world. https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html