From Pegasus to Predator – The evolution of commercial spyware on iOS [video]
https://media.ccc.de/v/38c3-from-pegasus-to-predator-the-evolution-of-commercial-spyware-on-iosBy cookiengineer at
saagarjha | 7 comments | 4 days ago
The efforts in this space by defensive organizations are laudable, but very, very immature. There's this meme that has crossed over into the software space of the planes the come back with a lot of holes in them, indicating the regions where extra armor plating is actually the least important. The commercial spyware industry is a lot like that. Those stories you see of people finding exploits via crash logs and iOS databases? That's the lowest hanging fruit. People who know what they are doing are not leaving traces there. And pretty soon those who don't will stop dropping things there too. It's really, really important to understand that the detections well that these people are sipping from will dry up very soon. The proposed solutions from the talk are not nearly enough to help. Some of the things they're asking for (process lists, for example) are already exposed, but we're currently in the Stone Age of iPhone forensics on the defensive side. Those on offense, who are incentivized by money but also now by necessity, will far outstrip any attempts to catch them after-the-fact :(
cookiengineer | 1 comment | 4 days ago
So far the approach still seems promising, but I would need more devs to help me as I'm contributing in my free time and I won't accept funding for my cyber security related projects, ever.
Would be nice if some other folks feel the same way as you and we can revive the Hypathia project to be better in the sense of eBPF process analysis, in-memory modification detection, and network analysis via XDP.
saagarjha | 1 comment | 4 days ago
cookiengineer | 1 comment | 4 days ago
You can detect a lot of malicious behaviour this way, where programs and processes deviate from their usual behaviour; e.g. trying to access files they're not supposed to.
saagarjha | 1 comment | 4 days ago
cookiengineer | 2 comments | 4 days ago
saagarjha | 1 comment | 4 days ago
stefan_ | 1 comment | 4 days ago
cookiengineer | 2 comments | 4 days ago
In your assumed concept, how else would offloading to a NIC that does not run a kernel work?
h4ck_th3_pl4n3t | 0 comments | 4 days ago
Grandparent's assumption is that the kernel is compromised.
Your assumption is that you can detect malicious behaviour before it happens (and before the kernel is compromised).
tptacek | 1 comment | 3 days ago
cookiengineer | 1 comment | 3 days ago
If the kernel really processes and parses the data packet _before_ eBPF and XDP can then you could exploit the kernel via single data packets. That's the context of the discussion, still. Meaning that in the hypothetical scenario that you found a programming error in the kernel code regarding the parsing of network packets.
Note: Parsing is not the same as copying, and I used the word parsing specifically on purpose here.
If the kernel does not process or parse the network packet other than sending the pointer to the previously copied buffer to an eBPF program - then that means a malicious packet can be blocked before anything else in the network stack is affected, right?
So, what do you think happens when I decide to write an eBPF/XDP program that blocks e.g. all TCP packets?
A) The network stack receives the packet
B) The network stack does not receive the packet
If your answer is A, we have a different definition of what you describe as the term "network stack".
To me, the network stack is everything that comes _after_ XDP passthrough. And that's outside the influence of my userspace/kernelspace program that tries to protect the system.
Also XDP is the earliest position in the kernel architecture to detect/validate/block malicious network packets. Because let's be real: I am never gonna be able to get anything merged in the kernel driver code of my network cards.
tptacek | 1 comment | 3 days ago
cookiengineer | 1 comment | 3 days ago
Detecting a network packet and detecting a rootkit are two very different things.
tptacek | 1 comment | 2 days ago
That's before we get to the more fundamental issue with the strategy, which is "what network packets would you even be looking for". The ones that say "CPL0 exploit"?
(Fun fact: literally looking for a packet that says "CPL0 exploit"? Super annoying to do in eBPF. No loops!)
cookiengineer | 1 comment | 2 days ago
Yes. [1] I also understand its limitations, e.g. not being able to do DNS compression due to its linearity and the bpf verifier only allowing statically inlined helper functions etc.
I think in general there is a misconception about what I was talking about. Maybe I was too unclear, dunno. I am aware that kernel self-checks cannot be implemented in the kernel itself. That is what I wanted to point out in my previous comment.
I was always talking about whether or not it's possible to protect the kernel from receiving known malicious network packets that could cause an RCE. And I think it is possible.
[1] https://github.com/tholian-network/firewall/blob/master/ebpf...
tptacek | 0 comments | 2 days ago
That eBPF firewall is a perfect example of what I'm talking about. It relies not just on the kernel but on a cooperating userland process to do all the "interesting" bits.
momento | 1 comment | 4 days ago
saagarjha | 0 comments | 4 days ago
ignoramous | 2 comments | 4 days ago
> ...we're currently in the Stone Age of iPhone forensics on the defensive side.
Since I've seen your comments show a pretty good understanding of AOSP/Android, what's your take on its posture against CSVs? Especially given that Google has been pursuing both legal [0] & technical defenses (at every level of the software stack) against them quite actively.
[0] Ex: https://www.centerforcybersecuritypolicy.org/hacking-policy-...
saagarjha | 1 comment | 4 days ago
ignoramous | 1 comment | 3 days ago
- How much impact will moving sharedlibs (mediaserver, for example) / runtime / libcore to Rust will bring? And if all libs will need to be moved? Or, are the likes of memory tagging, sanitizers, hardened allocators (Scudo in bionic / Arena/dl/Ros in ART) enough of a defense?
- Now that Android devices have as much compute/RAM as servers do (and fast battery charging is almost ubiquitous), do you see VM sandboxing apps (like in ChromeOS does with crostini) become a thing?
- Believe the drivers (Binder at one stage, GPUs, of late) remain a source of exploits; do you see a microkernel like Zircon being folded into the Android Kernel? Longer-term, will moving away from Linux (but maintaining compat via emulation, say) become a necessity to combat CSVs?
- I see a bunch of eBPF use since Android 12+. Do you foresee Google providing more APIs to aid forensics / monitoring (like Knox/EMM) without needing root (or abusing Accessibility/VPN/DeviceAdmin/ADB Shell/etc).
Thanks.
saagarjha | 0 comments | 3 days ago
I'm not an expert on specific attacks against allocators, but my general rule of thumb based on what they describe themselves as is that this helps but does not obviate heap memory corruption from being the source of exploitable vulnerabilities. So I would say that moving to Rust would still be useful.
> Now that Android devices have as much computer/RAM as servers do (and fast battery charging is almost ubiquitous), do you see VM sandboxing apps (like in ChromeOS does with crostini) become a thing?
So Android has a thing called pKVM that was designed, as far as I can tell, to run secret ML models and DRM. When I left they seemed to be looking for more pleasant clients, so it seems reasonable that they one day actually work to put security-critical services into VMs. But the overhead is quite high so I assume there will need to be a lot of work put into this if they want it to be practical.
> Believe the drivers (Binder at one stage, GPUs, of late) remain a source of exploits; do you see a microkernel like Zircon being folded into the Android Kernel? Longer-term, will moving away from Linux (but maintaining compat via emulation, say) become a necessity to combat CSVs?
I'm not entirely sure if this is possible, to be honest. Drivers on Android have been a pain point for a while. Google has much more control over their own hardware, of course, but for random other OEMs what typically happens is their drivers are binary blobs that rarely get updated. Making improvements in this area is a major effort.
I think, in the long term, that you can't just go "microkernel" to the problem of drivers, because some hardware is always going to have broad access for performance reasons. You can stick an IOMMU between things but some hardware (e.g. graphics) usually bypasses that and other hardware (e.g. storage, flash ROM) can compromise the entire device if tampered with. So I expect to see greater integration in the stack to try to secure these. Some of this may involve userspace drivers, but some might be more specialized to protect against more specific attacks.
> I see a bunch of eBPF use since Android 12+. Do you see Google actively work to provide more APIs for forensics / monitoring (like Knox/EMM) without needing root (or abusing Accessibility/VPN/DeviceAdmin/ADB Shell/etc).
So I don't think Google will give you arbitrary eBPF just because eBPF gets exploited a lot, so letting apps upload arbitrary programs is probably too spooky for them. More generally though they are interested in this space but it's very difficult to provide good APIs, because a lot of the people in this space are selling borderline-scam EDR, and providing the things they want just lets people make spyware easier. I have no idea what is next but I can say that when I was there the things I was creating signals that we felt were very costly to bypass. Unfortunately this is very, very difficult, and the difficulty only goes up as you attribute more capabilities to an attacker.
pxeger1 | 2 comments | 4 days ago
saagarjha | 0 comments | 4 days ago
technol0gic | 0 comments | 4 days ago
sylware | 1 comment | 4 days ago
Nowadays, presuming anything else is unreasonable, unless you want to scam somebody into buying a 'security product'.
saagarjha | 1 comment | 4 days ago
sylware | 1 comment | 3 days ago
But the basics are not even here: you should not use any compiler, all critical pieces of software should be assembly written with very lean SDK (aka extremely stable machine code), namely without the abuse of macro-preprocessor.
Everything else is just posture.
saagarjha | 1 comment | 3 days ago
sylware | 0 comments | 3 days ago
But really critical stuff should go as deep as custom ASIC and/or FPGA.
(A decade ago, I don't recall exactly, but those "security guys" did not even try with classic CPU ASICs, they were going custom _simple_ design on FGPA).
That was a decade ago... nowadays...
faramarz | 2 comments | 4 days ago
I have a sidebar question for you: what phone do you use if you are comfortable sharing.
I’m wondering if you are bias towards the walled garden of apple with its perceived security or android or some other.
saagarjha | 1 comment | 4 days ago
From your question I am guessing that this is a disappointing answer, since you probably wanted me to point to a specific phone and an explanation of why I think it is better. But any honest security professional is incapable of giving you a simple answer. I have a beat-up iPhone 13 mini because I like small phones and Apple is unlikely to make a new one soon. I have Lockdown Mode off because it would make my life more annoying than it needs to be. My threat model does not include sophisticated attackers that would be thwarted by security mitigations present in a new device or paranoid software. Should it be in yours? Well, I can try to help you answer that question. But for these attacks the problem is that 99.99% of people will never be targeted by them. But it's not very easy to tell if you're part of the 0.01% (these are made up numbers, btw). There are a lot of things you can do that can make you more or less attractive–for example, if you're a journalist, or a political activist, you might be more concerned. But what if your cousin you're close to is actually a VP at Google? More difficult to say. If you connect all the dots you can build all sorts of models where you should turn this on, regardless of who you are. But the fact is that security is not free and they almost always come with some sort of tradeoff against usability or cost. You could be mowed down on the street by an assassin tomorrow but that is generally a bad reason to never leave your house or walk everywhere in a kevlar vest.
My general advice for people, taking into account practicality and ease of implementation, is to go with a fairly modern phone of their pick that gets regular security updates, so they're not the subject of much lower-cost attacks that reuse patched vulnerabilities. I know a lot of the people who work on security at Apple and they're smart people who really care about making things that are good. Whether the walled garden accounts for that, or even if I think they always make the right choices…well, I have Opinions on that but that's for another day. They certainly make mistakes, but they also do good work. If you look at Android you'll see similar, with it pulling ahead in some areas and being behind in others. I've done a lot of research on Apple's security story and worked on Android's but I can only really rank them on specific facets rather than as a whole. Really I would say, pick up an iPhone or Pixel, be careful about things that are far more likely to hurt you (like, say, phishing), and otherwise just keep a pulse on this area if it interests you. Otherwise I think you have more than enough in your life to worry about.
newuser2022 | 1 comment | 4 days ago
saagarjha | 1 comment | 4 days ago
prirun | 0 comments | 3 days ago
Most HN folks think diversity is a good thing, and I'm not saying it isn't, but it does have its disadvantages. In my case, I could probably buy new Android phones at least 3x more often than iPhones based on cost, but a lot of people (me) don't want to be fiddling with new phones every year or 2. It was apparent to me that Android updates are not tested thoroughly on older phones. I understand that would be hard because there is a huge variety of hardware, but it's a significant downside of Android IMO.
jimmySixDOF | 2 comments | 4 days ago
saagarjha | 2 comments | 4 days ago
dmbche | 1 comment | 4 days ago
You need to calculate something? Great, do that.
You need to encrypt files, and keep them on your device which is connected to the internet, and want to trust that you are the only person that can access them? Think twice. Can be considered trivial for many attackers to have full access to your device, and assume ring 0 access. They could realistically record all keypresses and your screen, no need to decrypt anything.
Need to hide things from state actors? Never touch a computer again and go live in a cave somewhere until they find you.
SirHumphrey | 1 comment | 4 days ago
I always found this kind of thinking to be a bit unhelpful. Because what is an alternative? Paper? Hope you don't live in jurisdiction of the country because search warrant is not a difficult thing to get and even an illegal search is not that hard (even outside of the country).
As with everything - people in IT and IT security vastly underestimate the security of IT infrastructure while overestimating the security of non-IT infrastructure. IMO the use of computers makes you much more vulnerable to broad "we monitor the members public for signs of terrorism" kind of spying, rather than specific targeted state actor attacks - as was shown recently with the whole pager fiasco - there are many others non IT vulnerabilities around.
dmbche | 0 comments | 4 days ago
Most people are not worried about state actors having an interest in them, my comment was aiming to clarify that as well.
impossiblefork | 0 comments | 4 days ago
meisel | 1 comment | 3 days ago
tptacek | 1 comment | 3 days ago
The problem you have over the medium term is that CNE is incredibly cost-effective, so much so that you need something like multiple-order-of-magnitude cost increases to materially change how often it's applied. The alternative to CNE is human intelligence; it competes with literal truck rolls. You can make exploits cost 10x as much and you're not even scraping the costs just in employee benefits for an alternate intelligence program.
What that means is, unless you can foreclose on exploitation altogether, it's unlikely that you're going to disrupt the CNE supply chain for high-caliber state-level threat actors. Today, SOTA CNE stacks are probably available to the top IC/security agencies† of all of the top 100 GNP countries. It probably makes sense to think about countermeasures in terms of changing that to, like, the top 75 or 50 or something.
I think we tend to overestimate how expensive it is for adversarial vendors to keep up with countermeasures. It's difficult at first, but everything is difficult at first; I vividly remember 20-30 extraordinarily smart people struggling back in 1995 to get a proof-of-concept x86 stack overflow working, and when I first saw a sneak preview of ROP exploitation I didn't really even believe it was plausible. As a general rule of thumb I think that by the time you've heard about an exploitation technique, it's broadly integrated into the toolchains of most CNE vendors.
Further, remember that the exploit development techniques and people you've heard about are just the tip of the iceberg; you're mostly just hearing about work done by people who speak fluent English.
† Reminder that customers for CNE vendors usually include many different agencies, invoiced separately, in the same governments.
Jesus_piece | 1 comment | 3 days ago
tptacek | 0 comments | 3 days ago
Hilift | 2 comments | 4 days ago
saagarjha | 1 comment | 4 days ago
jacooper | 1 comment | 3 days ago
saagarjha | 0 comments | 3 days ago
dagmx | 0 comments | 3 days ago
The platforms that have famously had many significant exploits over the years, and are the cause of many major data exfiltration operations?
Are you pretending that viruses and worms don’t exist? Why does forwarding through we have things like windows defender or anti viruses then?
mu53 | 2 comments | 4 days ago
Who can afford these tools? What lengths have people gone to earn/keep large sums of money? What problems are society going through right now?
Its just stealing your data, which doesn't seem bad. But now, someone who probably doesn't like you has your location, habits, friends, future events. There are so many things that these people can do to interrupt the lives of journalists, activists, and just regular people with stalkers, and all of those things are covert because "How is your ex-girlfriend's friend supposed to know you made a bumble profile 2 days ago, find it, and match with you?"
alecco | 0 comments | 4 days ago
Even when heads of state are being extorted. Morocco used it against France and Spain. It fizzled out of the news cycle and nothing happened. And those countries later announced multi-billion Euro investments in Morocco. If anything, this is a signal hiring Pegasus is very profitable and they can do whatever they want.
tptacek | 0 comments | 3 days ago
† I picked Bahrain because they're the smallest country we know for a fact has been a customer of multiple CNE vendors, but that probably means Bahrain plus the next 20-30 countries down the list.
hssuser | 1 comment | 4 days ago
tptacek | 2 comments | 4 days ago
cylemons | 4 comments | 4 days ago
tptacek | 0 comments | 4 days ago
"SOTA" is just an abbreviation for "state of the art".
reaperman | 2 comments | 4 days ago
“Implant” would be like any remotely installable persistent exploit that grants access to an attacker over a period of time.
Also, I’m pretty luddite when it comes to highly-hyped AI stuff, (in spite of my income being heavily tied to developing AI models) but I have found ChatGPT to be shockingly good at explaining super niche terminology and even jokes. So I do recommend people feel comfortable turning to that if they ever feel uncomfortable asking “dumb” questions publicly.
throwup238 | 0 comments | 4 days ago
pockmarked19 | 3 comments | 4 days ago
That's right. People can just Google things.
cylemons | 0 comments | 4 days ago
maeil | 1 comment | 4 days ago
Google has been going down hill for many years but since the December update a few weeks ago it has genuinely become atrocious.
In their quest to combat AI slop (good idea), they've gone and made domain authority so much more important than the content, that now when you search for A B C, you get 20 pages from very "authoritive" sites that are about A, are slighyly about B and don't even mention C. This is despite plenty of great pages about A B C existing and serving the content we're looking for - we just never get to see them because the places they're hosted on aren't "authoritive" enough. Before, you'd get 5 pages, 1 of which likely had what you were looking for, and maybe 1-2 were AI slop. Now zero of them are what you're looking for, but at least we no longer have the (generally very obvious) slop? Brilliant improvement for the users..
The reason behind this is pretty obvious: most AI slop that had been ranking well likely had 0 ad spend, meanwhile the "authoritive" sites tend to have high ad spend. Ads was seeing numbers go down and unhappy customers, and they run the company.
layer8 | 1 comment | 3 days ago
maeil | 1 comment | 3 days ago
layer8 | 1 comment | 3 days ago
maeil | 0 comments | 23 hours ago
Though even in the US it largely holds for niche things. It's been a topic on HN for years, how Google has just stopped surfacing small websites with high quality information on a niche topic that can't be found elsewhere, but it's been greatly accelerated since last month.
Are the shopping results you're seeing ranked higher not from authoritive websites (Amazon, Walmart et al)?
gambiting | 0 comments | 4 days ago
js2 | 0 comments | 4 days ago
hammock | 2 comments | 4 days ago
tptacek | 2 comments | 4 days ago
saagarjha | 0 comments | 4 days ago
daneel_w | 2 comments | 4 days ago
saagarjha | 1 comment | 3 days ago
daneel_w | 1 comment | 3 days ago
tptacek | 1 comment | 3 days ago
On this leg of the thread, we're considering basically one issue: is NSO Group one of the {only,most} {important,impactful,sophisticated,whatever} CNE vendors. Is someone seriously arguing that's the case? I'd assume the idea that there are lots of vendors more impactful would be pretty banal, but maybe there really are people on this thread whose understanding of CNE comes entirely from that book linked upthread?
hammock | 1 comment | 3 days ago
tptacek | 1 comment | 3 days ago
By all means, sue them, sanction them, proscribe them, whatever it is you want to do to make NSO less profitable, I'm fine with it. But don't pretend that's solving the broad social problem of CNE operations. Everybody does it, and most people don't need NSO to do it; they have other, better vendors to work with.
hammock | 1 comment | 3 days ago
tptacek | 0 comments | 3 days ago
Actually conducting operations, totally different story.
vincnetas | 0 comments | 4 days ago
VagabundoP | 2 comments | 4 days ago
Make selling/using these attacks against government or other users a terrorist level event. Go after the heads of NSO and their like.
I'd say at that point the companies would be absorbed into the national intelligence infrastructure of the host county and cease to be independent entities who can be bought for the highest bidder. And I know NSO is basically like that now, but
I'd love to see some criminal sanctions for things that their software has been used for stick.
max_ | 2 comments | 4 days ago
The state is rotten to the core.
I don't even blame them. The real problem is the lack of philosophy and ethical standards in the tech industry.
Computer Technology is so shallow. Apple for example talks about being a proponent of privacy and at the same time the M1 Computers have built-in terrible spyware that cannot be removed (Apple made sure of this).
Every time I talk about this I am labelled as paranoid or sometimes "stupid". Alot of people simply rationalize this built in spying as "good".
The bitter truth is that we made our bed. Now we have to sleep in it.
TheJoeMan | 1 comment | 4 days ago
tptacek | 0 comments | 3 days ago
Infernal | 1 comment | 4 days ago
Can you say more about this?
max_ | 1 comment | 4 days ago
pxmpxm | 2 comments | 3 days ago
talldayo | 1 comment | 3 days ago
But sure, here's a version written by a well-known Apple toady explaining in-detail why this is bad and criticism is warranted: https://eclecticlight.co/2021/08/12/is-apple-keeping-its-pro...
mcculley | 2 comments | 3 days ago
talldayo | 1 comment | 3 days ago
mcculley | 0 comments | 3 days ago
Does Oakley writing about Apple products make him an "Apple toady" in your opinion? Or is there something he has written that is apologetic of Apple's behavior? I am asking a genuine question here. If you have no serious answer, that is understandable. I may have misinterpreted your words to be serious.
tptacek | 1 comment | 3 days ago
VagabundoP | 0 comments | 3 days ago
I think there could be some movement here, but there is certainly a level of protection that national governments are doing for these companies because they want their services.
sneak | 4 comments | 4 days ago
seanhunter | 0 comments | 4 days ago
lnsru | 0 comments | 4 days ago
layer8 | 0 comments | 3 days ago
darknavi | 5 comments | 4 days ago
IYasha | 0 comments | 4 days ago
>> We are aware of audio issues, especially during talks of day 1 (2024-12-27). Some talks have been released in a preview-version, but are still being worked on behind the scenes.
cbg0 | 0 comments | 4 days ago
https://pub-e2fd917248b04c518e963d141d588b4c.r2.dev/outputfi...
can16358p | 1 comment | 4 days ago
Syonyk | 1 comment | 4 days ago
darknavi | 1 comment | 4 days ago
nyclounge | 1 comment | 4 days ago
IYasha | 0 comments | 4 days ago
I was going to blame wireless mics, but they seem to be fixed?..
r9295 | 1 comment | 4 days ago
saagarjha | 0 comments | 4 days ago
motohagiography | 0 comments | 3 days ago
first hand: it's an artifact of "small coalition" governments, typically funded by resource wealth, and therefore without sophisticated public services that can support a spy agency who would develop their own inline national surveillance and intelligence infrastructure. it means they will always have to go to the commercial or grey market (like these vendors) to get this spying capability in malware, and eventually there will be diplomatic consequences to cutting some of them out with vulnerability patches.
there's another game at play where as iphones become more expensive and high risk to exploit, spyware providers switch away to things like vehicle entertainment systems, home and office AV and automation, and other personal tech. the market is small, but long term persistent. on the defender side, we just have to find a way to manage.
1oooqooq | 1 comment | 4 days ago
buy top of the line android like pixel pro: there's a huge toggle switch "allow 2G".
buy a middle or lower end device, no matter from Samsung, Motorola, etc... and for some inexplicable (heh) reason all companies decided that paying an engineer to apply a patch to remove that toggle from stock android was a solid investment :ponderingfaceemoji
you can still disable it with the very user friendly
*#*#4636#*#*
and then picking any radio preference list that excludes gsm. (edit: hn swallows asterisks)ugjka | 0 comments | 3 days ago
Syonyk | 8 comments | 4 days ago
You eliminate a ton of "complicated, probably exploitable things" in spaces known to be commonly exploited. Oddball image formats, the Javascript JIT engine, "complex" messaging (Facetime, MeMojis, that... entire ecosystem of weird-not-text-not-image stuff that Apple does), WebGL, WebRTC, link preview processing (I expect a common 0-click exploit chain is through that system), and probably some other stuff.
The phone/tablet is entirely usable without this stuff. Some websites don't render images properly, "that one guy's website" doesn't do the animations, but you can individually bypass Lockdown mode for sites, apps, etc - and you still get the protections for everything else.
And if you're a web developer or app developer, please. Test your website on an iOS device with Lockdown mode enabled. Pick image formats that render properly, it's not hard. And if your app requires something that isn't supported in Lockdown mode, that's fine - but please show some sort of useful error message that indicates that, perhaps, this crash/glitch/whatever is the result of Lockdown mode, and you can disable it by following these steps. Then, also, don't sell to some random purchaser of apps.
But Lockdown mode really, really helps reduce the attack surface. Try it. You'll like it! And it might just help prevent getting you popped by this sort of crap.
... then install QubesOS on your full computers and don't look back. ;)
jeroenhd | 1 comment | 4 days ago
However, I don't have access to Safari on a dev machine and until Apple fixes that, I'm not testing websites on iOS. Sorry not sorry, but even Microsoft Edge is cross platform these days, if Apple wants independent websites to support their browser (especially their own restricted browser profiles) they need to stop making it exclusive to their hardware.
Seems like a good idea to test against if you're already doing Safari testing but I'm not sure if automated tooling supports the toggle.
saagarjha | 2 comments | 4 days ago
jeroenhd | 0 comments | 3 days ago
I'm sure Apple could take Gnome Web and turn it into a cross-platform Safari browser if they wanted to, but so far they haven't (and probably don't want to).
realusername | 1 comment | 4 days ago
As a web developer, I'm also not bothering to test anything on iOS, it's just so much pain that it's not worth it. You need to buy a dedicated device with a specific iOS version and never update it (since you can't even change the browser version on iOS) and as for the debugging tools, they suck so much that I had to resort to Firebug.js a few times in the past.
Yeah no thanks, I just test on Android and hope it's good enough on iOS.
szundi | 1 comment | 4 days ago
realusername | 0 comments | 4 days ago
Personally I can't really do much about the sad state of the web on iOS myself anyways, I'm not a regulator. The problem goes beyond just the tech side.
aberoham | 2 comments | 4 days ago
kdmtctl | 0 comments | 3 days ago
And a sensitive device should not be easily discoverable to gatekeep who can actually send anything to it. This is also renders it unusable for day to day family tasks.
daneel_w | 0 comments | 4 days ago
captn3m0 | 2 comments | 4 days ago
Also, is JIT disabled for alternative browser engines in EU?
jeroenhd | 0 comments | 4 days ago
saagarjha | 0 comments | 4 days ago
szundi | 1 comment | 4 days ago
I would rather be interested in ways to detect these software phoning home on my home wifi with my firewall - for now. I might change this stance any moment in the future heh.
nwellinghoff | 2 comments | 4 days ago
dagmx | 1 comment | 3 days ago
How would you inspect it if it was piggybacking of a trusted but compromised endpoint? What if the data exfiltration doesn’t use a networking protocol you can monitor at all, like Bluetooth beacon transmitting?
The answer to almost any “why are people not saying this” is because it’s usually not that simple.
nwellinghoff | 1 comment | 3 days ago
2) That is a good example. Much harder to execute. I would argue in that case that everything is totally compromised. But if the hardware vendors provided a low level interface where one could read and write firmware etc. directly. One could do simple binary comparison analysis.
The point still stands. Figuring out what malware is doing is hard. Detecting that there is something in your system that wasn't there before shouldn't be hard. If the hardware vendors wanted to provide low level mechanisms to make the process easier. Its totally in the realm of the possible.
E.g. the main responder to this thread makes it seem like a impossible task even for dedicated security defense groups. But with just two mechanisms 1) network analysis 2) low level ability to read and write firmware/persistent storage. Its totally possible and straightforward.
dagmx | 0 comments | 3 days ago
fragmede | 0 comments | 4 days ago
pxmpxm | 1 comment | 3 days ago
The ratio of people that actually need this mode to people publicly advocating for it approaches zero very quickly. I'm quite sure no state actor will spend $7 figure 0days to get my cat photos.
Syonyk | 1 comment | 3 days ago
Also, for most people, it's not the cat photos on their phone that are of value. It's the banking credentials, business login 2FA keys, crypto 2FA, email (which allows, for almost all accounts, a password reset), etc.
nxobject | 0 comments | 3 days ago
nxobject | 2 comments | 4 days ago
saagarjha | 1 comment | 4 days ago
nxobject | 0 comments | 3 days ago
DrWhax | 0 comments | 4 days ago
joejoesvk | 1 comment | 4 days ago
Retr0id | 0 comments | 4 days ago
amatecha | 0 comments | 3 days ago
omegacharlie | 2 comments | 4 days ago
bflesch | 1 comment | 4 days ago
saagarjha | 0 comments | 3 days ago
saagarjha | 0 comments | 4 days ago
amelius | 2 comments | 4 days ago
monai | 1 comment | 4 days ago
amelius | 1 comment | 4 days ago
https://discussions.apple.com/thread/8282686
Not sure what to make of it.
Is it possible to reach the server side of the Time Machine from the Mac itself? Has such a breach been demonstrated?
kstrauser | 2 comments | 3 days ago
daghamm | 1 comment | 3 days ago
This is for attacks against bug companies. But maybe it's just a matter of time before "ordinary" ransomware is updated with destroy-backups function.
amelius | 0 comments | 3 days ago
amelius | 0 comments | 3 days ago
jaktet | 0 comments | 4 days ago
So if timemachine has versioning then maybe then you probably have some options, I’m not sure I’d call this being “safe” from ransomware.