They Found The iPhone Backdoor

Поделиться
HTML-код
  • Опубликовано: 24 ноя 2024

Комментарии • 1,8 тыс.

  • @TeeEllohwhydee
    @TeeEllohwhydee 11 месяцев назад +4977

    Not saying it was a backdoor. But if I wanted to code a backdoor, this is what I would have done.

    • @ViatoremDiEfa
      @ViatoremDiEfa 11 месяцев назад +288

      It’s really a feature and not a bug in this case.

    • @TheOfficialOriginalChad
      @TheOfficialOriginalChad 11 месяцев назад +145

      You would have coded it to require a 10 stage chain of exploits , across multiple development teams and computer design engineers?
      If it were your job, you would be very bad at it.

    • @Muhammad-sx7wr
      @Muhammad-sx7wr 11 месяцев назад +104

      Now that Intel is ramping up manufacturing in that country, you can be assured that more hidden instructions will be put into the processors below level zero.

    • @ekkekristo
      @ekkekristo 11 месяцев назад +3

      🤣

    • @FrontierGamers
      @FrontierGamers 11 месяцев назад +249

      ​@@TheOfficialOriginalChad good backdoors aren't easy to find, the point is only you know about it

  • @jer1776
    @jer1776 11 месяцев назад +2206

    Makes you wonder just how many of these "vulnerabilities" exist.

    • @junyaiwase
      @junyaiwase 11 месяцев назад +88

      Enough that if you knew how many you’d want to never tap a phone again! But lets hope most of them are undiscovered (for now)

    • @aishalotter9995
      @aishalotter9995 11 месяцев назад

      @@junyaiwaseyup I won’t own a mobile tracking device even a handheld one let alone the next generations , wearable , implantable , last but not least grown into your fucking brain !!!

    • @ivy8483
      @ivy8483 11 месяцев назад +16

      @@junyaiwaseoh boy , it’s just the beginning I’m afraid

    • @Slay_No_More
      @Slay_No_More 11 месяцев назад +41

      This is just the stuff we hear about.

    • @ValleyMansonOfficial
      @ValleyMansonOfficial 11 месяцев назад +35

      Let's talk about how many iPhone exploits are the same as Mac computer exploits that still haven't been patched; find them, and you'll destroy Apple in a day. I wish I was joking, yet here we are..

  • @hyp0thet1cal
    @hyp0thet1cal 11 месяцев назад +1878

    So the alleged backdoor is a set of registers in the processor that can directly write to and read from the memory while there is no other reason for these registers to exist. Sounds eerily similar to the Intel Management Engine or the AMD PSP.
    Definitely a coincidence how every major chip manufacturer added the same type of vulnerability to their products, 3 letter agencies are most certainly not involved.

    • @Tycy2014
      @Tycy2014 11 месяцев назад +94

      There is a vulnerable to hitting the like button on RUclips... you did not hear that from me thou

    • @catmanmliolunny
      @catmanmliolunny 11 месяцев назад +20

      @@Tycy2014 EXPLAIN GOOD SIR.

    • @Tycy2014
      @Tycy2014 11 месяцев назад

      @catmanmliolunny anytime there is a handshack between 2 users it uploads that into RUclipss data if you have a payload hidden behind your comments like button (if you already ran a sql injection on your comment) you can than have your like button carry payloads to other users and use assembly root functions to brute force your way or key loggers your way into others systems or get there internet traffic. The way you determine your like buttons url is by using Google Dorks to find the exact location of your comment... this is a multi step process
      Edit: I'm working on multiple cves right now using hidden payloads to find locations of people, all you need is the hand shack and a man in the middle function, and you can go crazy
      Edit: it's like giving cookies but only if you don't have access to their system.... if I wanted I could find out where you live given enough time. Or I could use social engineering to get the same results.

    • @kphaxx
      @kphaxx 11 месяцев назад +29

      @@Tycy2014 Worked like a charm, thanks homie

    • @Tycy2014
      @Tycy2014 11 месяцев назад +12

      @@kphaxx oh no

  • @atomicskull6405
    @atomicskull6405 11 месяцев назад +781

    "Don't worry, as long as we keep the backdoor a secret nobody will ever find it"
    Problem with that is that hackers and hostile states will from now on just assume there's a backdoor and look for it tirelessly.

    • @shinyrayquaza9
      @shinyrayquaza9 10 месяцев назад +93

      this is the exact issue I hated in the earn it act, putting a back door for the government means everyone can get that backdoor

    • @hollowgonzalo4329
      @hollowgonzalo4329 10 месяцев назад +1

      @atomicskull6405
      They didn't stumble across anything.
      Pegasus is Israeli.
      They either have insiders at various American glow bro organizations or they bribe and blackmail their way into getting access to le secret spy codes.

    • @gravyd316
      @gravyd316 10 месяцев назад +18

      There's always, and I mean always a back door.

    • @mazdaxc90
      @mazdaxc90 10 месяцев назад +3

      @@gravyd316not true

    • @George-ej4ju
      @George-ej4ju 10 месяцев назад

      Or have someone sell the secret to them. Which us probably what they did

  • @nothingtoseehere449
    @nothingtoseehere449 11 месяцев назад +848

    hope the glow boys enjoyed watching me goon at 4am

  • @Mr.Riojas
    @Mr.Riojas 11 месяцев назад +1073

    Deniability by the US is harder when they have been caught doing so many other behind the scenes spying... such as on social media.

    • @12time12
      @12time12 11 месяцев назад

      Who cares what the Russians think? They can whine all day, it’s not like they wouldn’t conduct similar tactics.

    • @moonasha
      @moonasha 11 месяцев назад +32

      I mean, is there a government out there that doesn't do this crap?

    • @ValleyMansonOfficial
      @ValleyMansonOfficial 11 месяцев назад +1

      Exactly

    • @ketelin4285
      @ketelin4285 11 месяцев назад +48

      @@moonasha most are very primitive and all but a handfull don't have aceess to global firms with bilions of users . it's a matter of exposure scale

    • @haplon33
      @haplon33 11 месяцев назад +4

      stuxnet

  • @camelotenglishtuition6394
    @camelotenglishtuition6394 11 месяцев назад +977

    Saw the triangulation presentation last night.. it's very clearly a backdoor.. and what was interesting is that it's been used for 10 years .. also the fact you can write to your own memory address if you know a "secret code " is fucking bananas

  • @rb2530
    @rb2530 11 месяцев назад +1683

    At one time, I worked with a network engineer that used to be in the Military. He had access to MS Source Code, not OP code, but the uncompiled Source Code. He said the military would not allow any device or software into their secure areas unless they had full control of it. He also said that the only sure way to defend a device was to remove external access. This includes having shielded hardware so it cannot be accessed via a remote, directional device that utilizes it's own EM broadcast to reach into your Hardware. Sci-Fi stuff huh? This was 28 years ago. Imagine what they can do now....

    • @dan00b8
      @dan00b8 11 месяцев назад +153

      That is so cool... too bad we are not presented this choice either, and have to deal with this bs

    • @Zaro2008
      @Zaro2008 11 месяцев назад +16

      Whats OP code?

    • @canaldecasta
      @canaldecasta 11 месяцев назад +77

      Didnt understand half of it but that sounds badass

    • @sirtra
      @sirtra 11 месяцев назад +141

      28 years ago was the era of 14.4k baud modems, cd-roms were connected through soundcards and this new OS called Windows 95 had just been released.
      There were no cell phones nor the concept of "devices" or "network engineers"
      It would also make you at least 40 years old today and old enough to not be so gullible or make up fake stories.
      What would having access to the source code do? Fork and compile their own version of win95 with the same undiscovered vulnerabilities as that is safer? 😂

    • @hanelyp1
      @hanelyp1 11 месяцев назад +107

      @@sirtra it's not foolproof, but having source code to inspect makes it a lot harder to slip in a back door.

  • @TurntableTV
    @TurntableTV 11 месяцев назад +1289

    Tim Cook: "Yeah, but sideloading is way more dangerous to our users security."

    • @Stone_624
      @Stone_624 11 месяцев назад +36

      Image more than one thing being true at the same time.

    • @hendrx
      @hendrx 11 месяцев назад +156

      @@Stone_624 except the sideloading part isn't true, you can always make it difficult for amateurs to sideload, they just want their 30% cut.

    • @intron9
      @intron9 11 месяцев назад +68

      "sideloading" what a stupid name they made. Why is it allowed on Macs then?

    • @MRJMXHD
      @MRJMXHD 11 месяцев назад

      I've been using Android for the past 6 years. And in that time, half of the apps I use are pirated, sideloaded apps. Never in this time have I ever been infected with malware, because well, I use my brains when sideloading. @@Stone_624

    • @tsunekakou1275
      @tsunekakou1275 11 месяцев назад +57

      ​@@Stone_624 imagine you know nothing about sideloading and make a dumb comment.

  • @mtallen56
    @mtallen56 11 месяцев назад +359

    The Pegasus exploit was actually insane, they used the fact that the steps of the gif compression algorithm were Turing complete, along with an exploit that let them execute an arbitrary number of steps of that algorithm, to build a computer out of the compression algorithm. When combined with the overflow exploit giving them access to the devices memory they had full control of the phone.

    • @zekiz774
      @zekiz774 11 месяцев назад +36

      Yeah that really doesn't sound like it was planned. And the unused registers probably were there for redundancy or they simply were left overs from the development.

    • @sn00pysfone
      @sn00pysfone 11 месяцев назад +40

      Smart mfs doing stuff like this meanwhile I’m proud of my crud b2b saas. Feels bad.

    • @Spiney09
      @Spiney09 10 месяцев назад +15

      @@zekiz774people here would rather attribute to malice something that can easily be explained as an oversight in an insanely complicated system. I’m really not apples biggest fan, but jumping to accusing them of conspiracy is unhinged.

    • @ryzikx
      @ryzikx 10 месяцев назад +8

      @@sn00pysfonesmart people push the world forwards, were just along for the ride

    • @amandahugenkiss
      @amandahugenkiss 10 месяцев назад +15

      Pegasus is actually pretty beautiful from a coding perspective.

  • @archstanton3931
    @archstanton3931 11 месяцев назад +871

    I remember working with assembly in school. Never thought I'd hear the term "unused registers" lol.

    • @hanelyp1
      @hanelyp1 11 месяцев назад +95

      Undocumented bit combinations in the machine code might hint at undocumented registers in the hardware. But figuring out special functions for those registers would be tricky.
      Unused space in the instruction set, on the other hand, is common.

    • @JohnDlugosz
      @JohnDlugosz 11 месяцев назад +45

      Not like the general purpose registers on the CPU -- probably talking about registers in the SoC, written to with a special instruction or memory mapped at some hardware address. Writing to it controls certain aspects of the various things in the System on a Chip.

    • @Muhammad-sx7wr
      @Muhammad-sx7wr 11 месяцев назад +24

      It exists in Intel and AMD. Undocumented instructions.

    • @andrewdunbar828
      @andrewdunbar828 11 месяцев назад +45

      We normally call them "undocumented registers". And they would refer to registers in hardware devices, not the CPU registers. Though even in the 8-bit days there were undocumented registers or partially documented registers, and modern CPUs are orders of magnitude more complex, often with multiple CPU cores in them, so a lot more places to hide undocumented registers. Undocumented opcodes are extremely common.

    • @andrewdunbar828
      @andrewdunbar828 11 месяцев назад +5

      @@Muhammad-sx7wr Always has.

  • @fetyrol7108
    @fetyrol7108 11 месяцев назад +394

    It's about time. The walled garden is breached

    • @Elinzar
      @Elinzar 11 месяцев назад +32

      Everything is breached

    • @thecon_quererarbitraryname6286
      @thecon_quererarbitraryname6286 11 месяцев назад +42

      The walled garden was never one to begin with (at least to the alphabet bois and NSO 😂)

    • @DanteMishima
      @DanteMishima 11 месяцев назад +22

      There has never been a wall, just a fence

    • @gullible119
      @gullible119 2 месяца назад

      ​@@DanteMishima that goes with any sort of security. No one has perfect security.

  • @sim00n99
    @sim00n99 11 месяцев назад +744

    Its pretty funny, considering several defence contractors and official defense departments around the world have contracts with apple to use iphones with IOS as their provided mobile devices, as well as Imessage as one of the primary comunication application.

    • @mycommentmyopinion
      @mycommentmyopinion 11 месяцев назад +51

      I wonder if they get patched version of ios, that don't have these vulns

    • @Dang3rMouSe
      @Dang3rMouSe 11 месяцев назад +1

      ​​​​​@@mycommentmyopinion imo unlikely. Someone within govt wanted total possible oversight over these contractors & defense depts by forcing then to use iphones & imessage they insured this happened. Imo this was an intentional backdoor sponsored by the US govt.

    • @xE92vD
      @xE92vD 11 месяцев назад

      funny how the government actually trusts closed source software for critical and sensitive stuff.

    • @dangerous8333
      @dangerous8333 11 месяцев назад +44

      Not that funny if you consider their versions are probably a lot different than the consumer models.

    • @GardenofEdens
      @GardenofEdens 11 месяцев назад

      ​@@dangerous8333 I would believe it's only the hardware with specialized software, but if not it seems like a bigger problem.

  • @nosidenoside2458
    @nosidenoside2458 11 месяцев назад +475

    No, they found *A* backdoor. Proprietary software is proprietary.

    • @balllord3546
      @balllord3546 11 месяцев назад

      reverse engineering doesnt exist apparently

    • @thewhitefalcon8539
      @thewhitefalcon8539 11 месяцев назад +8

      Not with Ghidra it's not.

    • @Takyodor2
      @Takyodor2 11 месяцев назад

      @@thewhitefalcon8539 If you buy a device with the software instead of installing it yourself, not even Ghidra can help you. If (and the size of that if may vary) the device lets you download the software off of it in order to decompile it, you have to trust that the hardware gives you the same code as whats running.

    • @detecta
      @detecta 11 месяцев назад +12

      i think its a jab at the fact iphones are considered "the most secure phone"

    • @orangejjay
      @orangejjay 10 месяцев назад +7

      ​@@detecta100% this. Apple does an awesome job of keeping it's cult brainwashed and loyal.
      Just like when they used to say "Macs don't get viruses." 😂

  • @gwky
    @gwky 11 месяцев назад +2849

    Apple users: "Umm, actually, it's a feature to protect me."

    • @sigma5088
      @sigma5088 11 месяцев назад +249

      "We're the resistance, this backdoor is only to stop the bad people from using iPhones."

    • @glock-kay
      @glock-kay 11 месяцев назад +44

      Nah, f no. I dislike Apple because of their bs and lies.

    • @ClickClack_Bam
      @ClickClack_Bam 11 месяцев назад +155

      "It's to make the battery work better on older phones."

    • @ДімаКрасько-с7м
      @ДімаКрасько-с7м 11 месяцев назад +10

      ​@@glock-kaydo we even have something secure? I mean intel me work regardless of your os

    • @njpme
      @njpme 11 месяцев назад

      ​@@ДімаКрасько-с7мNo. Nothing is

  • @notafbihoneypot8487
    @notafbihoneypot8487 11 месяцев назад +106

    Remeber guys, if they say its the most secure with no open source software,
    Its not

    • @muhammadsubhani7420
      @muhammadsubhani7420 11 месяцев назад

      People should look at Mattermost application open source for self-hosted end to end encrypted messaging. It's like Slack for developers, used for secure communications by Airforce, Samsung, and more.

    • @GrueneVanilleWaffel
      @GrueneVanilleWaffel 11 месяцев назад +3

      And Hardware?

    • @muhammadsubhani7420
      @muhammadsubhani7420 11 месяцев назад

      @@GrueneVanilleWaffel Truly difficult finding OS hardware because the scale of production it takes a hardware company to be profitable is a long time horizon and huge amounts of capital.
      While you can find some OS hardware, you can do a surprising amount of interesting things running with Virtual Machines if you really know what you're doing.
      Remember, the more convenient/usable the product, the more hackable it is.
      OG cybersecure guys run many systems straight from the Command Line on an old Thinkpad laptop as a controller for a big server farm, but you have to know what you're doing.

    • @fulconandroadcone9488
      @fulconandroadcone9488 11 месяцев назад +1

      If you don't need a specific app and it might have a security vulnerability and you can't remove it the only think you can really do is not use the entire thing.

  • @asdion
    @asdion 11 месяцев назад +106

    >a blackbox has horrible vulnerabilities?
    Oh shucks matey i could not have possibly expected something like that

    • @dan00b8
      @dan00b8 11 месяцев назад +7

      I mean an open box also has horrible vulnerabilities... A little harder to make them intentional like in blackbox, but Minnesota Linux kernel ban situation kinda proved it to be possible...

    • @surewhynot6259
      @surewhynot6259 11 месяцев назад +10

      Unfortunately, there are plenty of horrible vulns even in open source. A couple of sudo vulns went undiscovered for over a decade, and these led to full privilege escalation.

    • @asdion
      @asdion 11 месяцев назад +12

      @@surewhynot6259 The point was rather, all software has vulnerabilities, and making it closed source makes things worse.

    • @chrisdawson1776
      @chrisdawson1776 11 месяцев назад +1

      Couldn't you bypass any Linux system by pressing backspace 20 something times?

    • @asdion
      @asdion 11 месяцев назад

      @@chrisdawson1776 That really was not as big of a deal as people made it out to be, if someone got into the position to exploit that vulnerability you had already lost at every step because the person is literally standing in-front of your system.
      Generally exploits that require physical access to the system are more of a joke than anything since at that point there are countless non exploit ways to get into the system.
      But most importantly, that exploit is for GRUB2 if you encrypt your system (if you want password protection on your OS) getting past GRUB2 is going to be utterly worthless.
      As is i'd bet 99% of users do not have a password set for GRUB2, same goes for corporations (at least those i worked for) because it's simply unnecessary and in a corporate environment you don't want to be locked out of your boot loader with a password.
      TLDR: that exploit was overblown lwn.net/Articles/668695/

  • @nonetrix3066
    @nonetrix3066 11 месяцев назад +166

    This isn't about software, you could run 100% free software, and yet your CPU would still be backdoored. And you know that AMD and Intel both have it too, likely other ARM manufacturers too, who knows which are safe if any

    • @9eleven1877
      @9eleven1877 11 месяцев назад +20

      Chips within chips within chips 🪆

    • @fulconandroadcone9488
      @fulconandroadcone9488 11 месяцев назад +22

      There seems to be some open source hardware development going on, maybe if we get a year of linux desktop one day we get a day of linux cpus.

    • @nonetrix3066
      @nonetrix3066 11 месяцев назад

      @@fulconandroadcone9488 Even with open hardware we can't tell if the fab that makes the CPU didn't tamper with it

    • @Mernom
      @Mernom 10 месяцев назад +1

      If the software is FOS, there are plenty enough geeks to find and patch those exploits in due time. If it's not, they will sit there until the for profit programmers who work on things that make them money (AKA not wasting time looking for potential security exploits in the most obscure corners of their source code) to fix it, or for a scandal like this to force their hand.
      A hardware exploit is meaningless if there is no software path to activate it.

    • @futuremapper_
      @futuremapper_ 10 месяцев назад

      @@fulconandroadcone9488it’s almost impossible for a reasonably priced open source cpu to exist based on just how complicated it is

  • @Nichrysalis
    @Nichrysalis 11 месяцев назад +64

    Based on how convoluted the attack chain was obfuscated and yet how easy it is for an attacker, this was definitely intentionally implemented to make the attack method difficult to find and easy to carry out.

  • @233kosta
    @233kosta 11 месяцев назад +175

    5:08 They call the process "fuzzing". Essentially, throw arbitrary instructions at the chip and see what happens. Some you cab bruteforce like that really quickly. Others can take weeks.

    • @古明地恋-s9c
      @古明地恋-s9c 11 месяцев назад +4

      because ARM is RISC

    • @lucasthompson1650
      @lucasthompson1650 11 месяцев назад +22

      Yup. Fuzzing (and JTAG/test pads) is how a lot of this kinda stuff gets discovered.

    • @233kosta
      @233kosta 11 месяцев назад

      @@古明地恋-s9c They do it to x86 too. Easier and quicker on RISC chips though.

    • @fulconandroadcone9488
      @fulconandroadcone9488 11 месяцев назад +2

      @@lucasthompson1650 then the question is, doesn't apple has better access to those same things, and could run it from you know start of development instead of having to buy some some and revers engineer all of the stuff?

    • @OrioPrisco
      @OrioPrisco 11 месяцев назад +3

      yeah i've watched some of christopher domas defcon talks on youtube and this is exactly the sprt of stuff he does, And he is just one guy. An entire corporation can surely do the same sort of stuff

  • @extra-terra-strial-bv9pv
    @extra-terra-strial-bv9pv 11 месяцев назад +48

    Sending this to my apple obsessed friend

    • @匿名-x5m
      @匿名-x5m 11 месяцев назад +15

      Nooooo, he gonna defend Apple anyway😂

  • @X21XXI
    @X21XXI 11 месяцев назад +35

    Security has always been a matter of ''are you bored enough to do it? '' as opposed to the fear based ''is it possible? ''

  • @joeykeilholz925
    @joeykeilholz925 11 месяцев назад +58

    Can't get viruses. Just entire vulnerabilities. But they won't let you so much as install an app not authorized by them.

    • @firewhite
      @firewhite 11 месяцев назад +15

      I love how everyone was in a big fuss about side loading apps being a huge risk while shit like this happens every few years. Just like those massive icloud breaches back in the 2010’s

    • @fulconandroadcone9488
      @fulconandroadcone9488 11 месяцев назад

      Or remove apps that might be entry points.

    • @Gadfly321
      @Gadfly321 10 месяцев назад

      Apple is the virus

  • @CentreMetre
    @CentreMetre 11 месяцев назад +246

    My face when closed source software isnt the most secure thing in the world

    • @GrueneVanilleWaffel
      @GrueneVanilleWaffel 11 месяцев назад +17

      Hardware

    • @knight808.
      @knight808. 11 месяцев назад +27

      @@GrueneVanilleWaffelhe means iOS but yea you’re both right

    • @CentreMetre
      @CentreMetre 11 месяцев назад

      @@GrueneVanilleWaffel wdym by hardware? Not disagreeing just have no clue what you mean

    • @DinahAO
      @DinahAO 11 месяцев назад +3

      @@CentreMetresoftware is any sort of application within the device. hardware is the actual device itself and all its parts.
      a good way to remember it is, if the equipment can be touched it’s hardware, if it cannot it is software

    • @CentreMetre
      @CentreMetre 11 месяцев назад +1

      @@DinahAO I know the difference between hardware and software. I just dont get why he meant by the word "hardware"

  • @guilhemedemassenaladario
    @guilhemedemassenaladario 11 месяцев назад +108

    Hidden instructions and registers can be found by fuzzing the CPU. This is something that has been done in the past on custom CPUs based on well-known architectures. I think the main question is why these unused features got in the final product, or if is an undesired side effect in the architecture.

    • @MRL8770
      @MRL8770 11 месяцев назад +11

      The reason why might be as simple as to cut the costs that would go into design and verification stages for a new version of the chip with the registers removed.

    • @ic7481
      @ic7481 11 месяцев назад +3

      Fuzzing won't find everything

    • @rivershen8199
      @rivershen8199 11 месяцев назад +8

      Yes, especially when you consider that they could make the exploit dependant on two special instructions in a row. The second won't do anything unless the first one is used directly before and using the first instruction will not produce any visible effect unless the second is used directly after.
      How you gonna brute force fuzz your way through that? There's exponential possibilities.

    • @ic7481
      @ic7481 11 месяцев назад +5

      @@rivershen8199 plus there could also be built in time depedancies - this adds another level of exponential possibilities.

    • @MRL8770
      @MRL8770 11 месяцев назад

      @@ic7481 It can find A LOT. For example AMD's (formerly Xilinx) bitstream formats of their 7-series FPGAs have been reverse-engineered with fuzzing.

  • @Log4Jake
    @Log4Jake 11 месяцев назад +195

    The apple people "we can't get hacked" also pegasus exist.

    • @no_name4796
      @no_name4796 11 месяцев назад +23

      And also apple themselves are the biggest threat to apple users privacy, and i would like to brag ablut using android, but i don't even think google is less bad...
      Well at least i use linux on my computer

    • @arthurwintersight7868
      @arthurwintersight7868 11 месяцев назад

      @@no_name4796 - What we need is a law mandating that all hardware above a certain level of processing capability (IE, anything stronger than a smart phone from ten years ago) has to support an open source operating system - either freeBSD or Linux, where the penalty for a regulator not being able to install Linux or freeBSD on the device, is a full public-domain release of all hardware schematics, and any and all source code related to the device, along with a forfeiture of any copyrights and patents related to said device. We need to stop dancing around the bush on this shit - if it supports Linux then it'll support Windows, Android, and any other operating system in existence as well.

    • @twenty-fifth420
      @twenty-fifth420 11 месяцев назад

      @@no_name4796To be very fair, I think mobile devices are easier to compromise then desktops. I think I saw a video about someone claiming the opposite and I sort of laughed at it, but I couldn’t tell ya if that is true or not.
      Personally, I think it easier because phones are largely ‘simpler’ systems with more attack vectors since they are ‘smart’ devices. The chips are different from desktops, there is more features like the camera or the fingerprint detection that can make a hacker blush. Finally, I think the more closed source nature of the app stores could be used to maliciously distribute bad code easier then just browsing online.
      I could be wrong, I am definitely not a security expert.

    • @harriet-x.x
      @harriet-x.x 11 месяцев назад

      ​@@no_name4796depends on what phone and os you use, you can use lineageos and hell even grapheneos if you want!

    • @JO3BID3N-is-a-P3D0
      @JO3BID3N-is-a-P3D0 11 месяцев назад

      as someone who doesnt like apple at all, and genuinely really believes that Pegasus and other mythical creatures exist, your comment has me really confused. i am not being sarcastic at all

  • @Underqualified_Gunman
    @Underqualified_Gunman 11 месяцев назад +83

    I remember hearing about some folks getting stalked with a similar exploit.

    • @zekiz774
      @zekiz774 11 месяцев назад +7

      It was with this exact one

  • @mskiptr
    @mskiptr 11 месяцев назад +48

    Going by the analysis of Marcan (the MacBook Linux guy), it seems like this vulnerability could have plausibly been found by just guessing. The memory addresses it uses lie right next to the GPU control area, so by poking here and there you could have found it does _something._
    Still, the number of (0-day) exploits used here and the sophistication of the entire deployment chain is mind-boggling and comparable only to the likes of Stuxnet! Definitely from a state-sponsored hacking group.

    • @silverdragonslair
      @silverdragonslair 11 месяцев назад +7

      And he also thinks they're hardware design debug registers, not an intended backdoor, per se.

    • @ra2enjoyer708
      @ra2enjoyer708 11 месяцев назад +8

      @@silverdragonslair The best part these things are not exclusive.

  • @Heynmffc
    @Heynmffc 11 месяцев назад +41

    4 new zero day drop 🗣🗣🗣

  • @ihadmyfill
    @ihadmyfill 11 месяцев назад +51

    defo a glowie backdoor

  • @IDESTROYER236
    @IDESTROYER236 11 месяцев назад +267

    At this point, Apple does not have vulnerabilities. They have full-blown goatses.

    • @jebediahkerman8245
      @jebediahkerman8245 11 месяцев назад +26

      Why did you do this

    • @sirspoonyr
      @sirspoonyr 11 месяцев назад +21

      please take my like and delete this naow

    • @dankhill_
      @dankhill_ 11 месяцев назад +12

      Full blown and goatse should NEVER be together in a sentence….. 🤢

    • @thewhitefalcon8539
      @thewhitefalcon8539 11 месяцев назад +4

      This isn't a full blown goatse. It's actually a very typical escalation chain.

    • @deadchannel2837
      @deadchannel2837 11 месяцев назад +3

      I just like the term goatse

  • @IridescentKySoul
    @IridescentKySoul 11 месяцев назад +89

    Apple users try to not bend over for the company challenge (impossible)

    • @gwrydd
      @gwrydd 11 месяцев назад +8

      Googles not any better lol all big tech companies are a huge privacy concern example being the incognito recently

    • @MaxwelI
      @MaxwelI 11 месяцев назад +11

      Look y’all once your device has Wifi, Bluetooth or any means of connecting with the outside world it’s vulnerable, theoretically if you actually wanted to be completely safe you’d need to download all apps and games that you want, then disconnect the Wifi and Bluetooth chip, plus other components that may have contact with the outside world. No system is 100% safe

    • @algumnomeaihehe
      @algumnomeaihehe 10 месяцев назад +2

      anglophone try not to blame individuals for systemic issues challenge
      (just read althusser)

    • @Spiney09
      @Spiney09 10 месяцев назад

      How is this exclusively an Apple thing? Like yes this particular video is about an Apple exploit that is really dangerous and that’s bad, granted. But if you think there aren’t cyber weapons that are just as dangerous targeted around Windows and Linux you are deluding yourself. The US has already leaked some of the ones targeted around Windows accidentally, we know they have them.

  • @magicmanchloe
    @magicmanchloe 11 месяцев назад +20

    5:50 I work in 3rd party repair fixing iPhones for a living. I once accidentally triggered the iPhone the blue screen (yes blue screen on iOS) with a strange code on the display. Apple support didn’t know what it was and google had no info. I accidentally triggered it by connecting a faulty screen with the pins for the display connection misaligned. My best guess is it was some sort of internal debugging or diagnostic mode.
    So I’m not saying that you’re wrong I’m just saying it’s possible to Find these “back doors” in other ways.

  • @LaskyLabs
    @LaskyLabs 11 месяцев назад +236

    Shame it was abused by the glowies instead of given to the people for a jailbreak instead.

    • @thewonderingape6383
      @thewonderingape6383 11 месяцев назад +35

      fr an ios 15.7 jailbreak on non checkm8 devices would be amazing

    • @Enderspearl184
      @Enderspearl184 10 месяцев назад

      @@thewonderingape6383aka you currently have that setup right
      i may or may not be hoping for something similar though lol

    • @wilh3lmmusic
      @wilh3lmmusic 10 месяцев назад

      @@thewonderingape6383it’s coming

  • @Rayyan-hi2ge
    @Rayyan-hi2ge 11 месяцев назад +190

    Too bad the gloweys have way more vulnerabilities.

  • @Lupinicus1664
    @Lupinicus1664 11 месяцев назад +46

    This kind of thing, where the hardware itself is 'untrustworthy', has been a suspicion for years. I have some older IBM laptops which I use for a password database, that is never connected online, but also because it is one of the last laptops where the chipsets are 'known' to be what you think they are. Without any possible additional 'features'. Excellent video as always.

    • @fulconandroadcone9488
      @fulconandroadcone9488 11 месяцев назад +8

      I wonder how long until fully open source chip designs hit the market, I have seen some RISC V but at very low powers, maybe in a few years it will only be a question can we trust the foundry to build actual designs,

    • @contactjd
      @contactjd 10 месяцев назад +2

      What era/chipset is that out of interest?

    • @phgamer4393
      @phgamer4393 9 месяцев назад

      @@contactjd i mean there is no proof even back then that they arent backdoored. I think in the K& R C boiok there is even a topic about rogue compilers. like the problem goes way back to the 70s/80s.

  • @praisephillips9459
    @praisephillips9459 11 месяцев назад +31

    "china phone bad because backdoor"
    America fone:

    • @nxb00
      @nxb00 9 месяцев назад +4

      i feel like the reason for canada to ban Xiaomi was not because they cared about their citizens' privacy, but rather to monopolize on profiting from their data themselves

    • @tbhUSuckOo
      @tbhUSuckOo 8 месяцев назад

      This. China doesnt need to collect data themselves, they already have an immense inhouse userbase. And they can just buy it@@nxb00

  • @camsand6109
    @camsand6109 11 месяцев назад +25

    I figured this had something to do with Pegasus. Crazy it took them this long to patch it.

    • @jittertn
      @jittertn 11 месяцев назад +11

      One of the exploits used is from the 90's 😂

    • @EnFuego79
      @EnFuego79 11 месяцев назад +1

      "Patch"...🤨

  • @bckends_
    @bckends_ 11 месяцев назад +58

    Bro please inform people that simple mobile tools got sold to some sketchy corpo

    • @not-underscore
      @not-underscore 11 месяцев назад

      ​@@kevinm45684to zipoapps, known to buy projects and then put ads and subscriptions on them
      So, it was good while it lasted 🫡

    • @tflsh
      @tflsh 11 месяцев назад

      ​@@kevinm45684zippoapps

    • @harriet-x.x
      @harriet-x.x 11 месяцев назад

      ​@@kevinm45684some random chinese company that makes ad bloated apps :< But!! If you do NOT update you are fine!

    • @imgladnotu9527
      @imgladnotu9527 11 месяцев назад

      ​@@kevinm45684zippoapps

    • @bluflare12345
      @bluflare12345 11 месяцев назад +3

      Thanks for the heads up! Just uninstalled.

  • @Linkman8912
    @Linkman8912 7 месяцев назад +1

    "Spectre and Meltdown, which were like 5 years ago."
    Yeah I feel old now.

  • @Arek_R.
    @Arek_R. 11 месяцев назад +22

    When you design your own silicon it's almost impossible to accidentally add extra stuff.
    It's a massive investment especially in this case, and everything gets checked thousands of times by hundreds of experts.

    • @theofficialjeff
      @theofficialjeff 10 месяцев назад +10

      You say expert, I say coworker desperately trying to close the Jira ticket from hell to get his manager off his back.

    • @Arek_R.
      @Arek_R. 10 месяцев назад +5

      @@theofficialjeff Isn't Jira for software development

    • @theofficialjeff
      @theofficialjeff 10 месяцев назад

      @@Arek_R. project management in general ¯\_(ツ)_/¯

  • @myREALnameISiAM
    @myREALnameISiAM 11 месяцев назад +15

    'Backdoors' are in the original charter of the F.B.I. It started with phones and service providers being required to design the phone network so it can be spied on.

    • @orangejjay
      @orangejjay 10 месяцев назад

      You do realize that the "original" FBI charter was written only 40 or so years ago, well after the FBI had been in existence, yes?
      And no, that original charter makes no mention of requiring phone providers to design a network that can be spied on.
      The nature of analog and digital are such that they can be spied on. No one forced anyone to make them that way.
      Anyone who understands even the basics of how wires and circuits work can see that. It's not particularly complicated. 😂

  • @JohnDlugosz
    @JohnDlugosz 11 месяцев назад +63

    5:45 How could anyone figure out how to use this undocumented feature?
    There was an interesting presentation, on the Intel-AMD64 architecture, at one of the major programming conferences a couple years ago.
    1) the presenter wrote very clever code to find undocumented instructions. This included executing bytes at the very end of a memory page to see if the instruction was "taken" before it fetched bytes from beyond the page. When discovering a new instruction, he would thus determine how many bytes it needed.
    2) read patent applications. If they describe some feature of the SoC, maybe they're _doing_ something like that on some existing product now.
    I'm sure the same principles apply to this platform.

    • @Rightly_Divided
      @Rightly_Divided 11 месяцев назад +2

      Brilliant observation!

    • @Iceman259
      @Iceman259 11 месяцев назад +20

      State level actors can also simply crack open an iPhone and run it under an SEM. Hell, @BreakingTaps does this as an individual. Not a long shot to find secret registers that way.

    • @afinelad3673
      @afinelad3673 11 месяцев назад +4

      What's an SEM?

    • @ldt8904
      @ldt8904 11 месяцев назад

      @@afinelad3673scanning electron microscope

    • @rivershen8199
      @rivershen8199 11 месяцев назад +6

      Scanning electron microscope. They can detect much finer detail than light can.

  • @FeedMeSalt
    @FeedMeSalt 11 месяцев назад +20

    So basically ACE from fucking Zelda speed running but even worse. Amazing.
    Being able to mess with memory is unbelievable.

  • @talon12020
    @talon12020 11 месяцев назад +23

    They attacked Kaspersky devs? Oh yeah this glows brightly.

    • @imgladnotu9527
      @imgladnotu9527 11 месяцев назад +2

      that was a while back and he also covered the news

    • @evilleader1991
      @evilleader1991 11 месяцев назад +1

      That was how they got caught, they attacked researchers @ Kaspersky and they managed to uncover the whole thing.

  • @waltergabriel5501
    @waltergabriel5501 11 месяцев назад +97

    In my opinion, this is clearly a backdoor planted by the manufacturer

  • @ld2048
    @ld2048 10 месяцев назад +5

    the NSA forces US semiconductor manufacturers to leave physical backdoors in the architecture itself, TSMC doesnt escape it either

    • @pro_154
      @pro_154 10 месяцев назад

      I've been suspecting this for years, suprised to hear pseudo confirmation

  • @navibongo9354
    @navibongo9354 9 месяцев назад

    Exploit aside, your presentation was perfectly on the spot. No rambling, no bs, just spot on fax & technical breakdowns. 👍

  • @MushookieMan
    @MushookieMan 11 месяцев назад +5

    Closed source, absolutely proprietary

  • @stanleykeal2452
    @stanleykeal2452 11 месяцев назад +13

    I wouldn’t be surprised if they put Pegasus on the phones before they come out at this point.

  • @Xhadp
    @Xhadp 10 месяцев назад +8

    Anyone remember the time when an organization had to get involved for a iphone where the really badly wanted to get the contents but one last failed password attempt wiped the iphone's contents? I wonder if anything related to this backdoor could be connected back to that whole thing that ended up being a huge non-story at the end of the day.

  • @deleleledrios2018
    @deleleledrios2018 11 месяцев назад +53

    Thats why i use GrapheneOS on my Google Pixel and you should too

    • @kevinmiller5467
      @kevinmiller5467 11 месяцев назад +57

      Do you think Google doesn't include hardware backdoors in their pixel phones?

    • @salpertia
      @salpertia 11 месяцев назад +4

      Nice bet
      *unless there's a zero day for grapheme we don't know about despite all that open source*

    • @guestimator121
      @guestimator121 11 месяцев назад +1

      @@kevinm45684 Hello, mr Glowwie 45684

    • @ScarfaceLittlebee-mj2ch
      @ScarfaceLittlebee-mj2ch 11 месяцев назад +1

      I use a modified Android

    • @dan00b8
      @dan00b8 11 месяцев назад

      @@kevinmiller5467 Still a better bet than the combo of backdoored OS+hardware. Even if the hardware itself is compromised, you have to find an (unintentional) 0 day exploit that escalates you from nothing to hardware level in order to exploit that backdoor anyway. And the grapheneos team has shown that they really dont play around and actively assume through each line they write that "if this piece of code were to be exploited, would the danger at least be contained?"
      Also it is very difficult nowadays to find hardware that is (provably) not backdoored, or check the integrity of the claimed implementation, which is why even if they open sourced their titan m firmware you still would not be completely sure. This is why bothering with such details goes beyond tinfoil hat territory. I mean if someone else with backdoor access gets a physical hold of your phone you would be screwed but if your threat model is that large and you got in that situation you screwed up somewhere else entirely anyway...

  • @GazMatic
    @GazMatic 11 месяцев назад +24

    7:25 As someone who was in Russia, saying “avoid American products” is very difficult because the Russian versions were so underwhelming. Matter of fact, Putin has been trying to push Russians to use their version for years. Guess what though. Because of the Russian war, a large adoption of Russian products arose. Although it’s still not the majority because these products are still mediocre.

    • @alexturnbackthearmy1907
      @alexturnbackthearmy1907 11 месяцев назад +12

      And in 90% of cases are re-brands made in china from used/bad binned chips. No wonders here, even if they have a tech, there is no way to make modern things, there are no factories capable of making them (even something of 2010`s level of architecture).

    • @FIAaPn
      @FIAaPn 10 месяцев назад

      I'm not sure about the government jobs, but pretty much everyone here uses WhatsApp, no matter the age. Younger folk (especially females) uses Instagram (via VPN) - both belong to Meta.

  • @cobblerthebold
    @cobblerthebold 11 месяцев назад +29

    Thank you for all your videos, of all genres. They’re always appreciated and at least somewhat entertaining. But someone referring to you as Vegan Gains is just about the funniest thing I’ve seen related to your context.

    • @ekkekristo
      @ekkekristo 11 месяцев назад

      lmao 🤣🤣🤣

    • @experiment54
      @experiment54 10 месяцев назад

      Bro is a doppelgänger

  • @drumitar
    @drumitar 11 месяцев назад +35

    imagine using apple products at this point.

    • @Not_Airrack
      @Not_Airrack 11 месяцев назад +23

      Do you really think android is safer?

    • @MrSolidsnake293
      @MrSolidsnake293 11 месяцев назад

      @@Not_Airrack at this point anything is better than apple, and the best choice of all is to get off grid, cant hack what isn't digital. when real life comes knocking these hackers wont be safe.
      Real Life catches up to everyone

    • @firewhite
      @firewhite 11 месяцев назад +2

      It’s honestly mostly about the convenience of a simple device. I still have an android for work and more heavy duty stuff but an iphone is an easier daily driver for simple tasks.

    • @MrSolidsnake293
      @MrSolidsnake293 11 месяцев назад +7

      @@firewhite Apple is not more convenient its OS is built so that normies cant do anything with it other than what apple allows....these people must like being in a playpen while everyone else goes outside to the real playground.
      saying apple is an "easier daily driver for simple tasks" is like saying a children's learning computer from playschool is the best choice for people who need an "easier daily driver for simple tasks"
      the problem is people refuse to adapt to technology and the companies are taking advantage of said ignorant customer who refused to move away from a locked system that they don't even truly own, therefore allowing the industry to corner people into thinking that a closed system is better than an open one
      it happened to restaurants, it happened to cars, and now its happening to basic computer and phone....

    • @harriet-x.x
      @harriet-x.x 11 месяцев назад +12

      ​@@Not_Airracklaughs in graphene os yes mate it is :P

  • @SlainByTheWire
    @SlainByTheWire 11 месяцев назад +38

    Death knocking on door meme.
    Intel door: 👽 dead
    AMD door: 👽 dead
    ARM door: knock knock 👽

    • @poisonouspotato1
      @poisonouspotato1 11 месяцев назад +9

      Bogos binted energy 👽

    • @USB3.2
      @USB3.2 11 месяцев назад

      Well, time for PowerPC to come back

    • @find2hard
      @find2hard 11 месяцев назад +2

      RISC-V pls save us!

    • @wkwndndhshhshs
      @wkwndndhshhshs 9 месяцев назад

      Rotten 🥧

  • @galencole2108
    @galencole2108 11 месяцев назад +7

    If Kaspersky is reporting on this it was the one for the Russian iPhone users at the start of the war, and now they started to use Chinese phones. This comes after the Push Notification server thing for all phones, the US Government and associates is grubbing on these.

  • @journey8533
    @journey8533 11 месяцев назад +44

    The only reason to keep code closed source is because you have something to hide. Either its embarrassingly bad, or its malicious. Today, like every day you see closed source products, you have to ask yourself. Was this incompetence or malice?
    In this case it took so many lucky coincidences and lucky hardware quirks, i think it was malicious.

    • @MrSolidsnake293
      @MrSolidsnake293 11 месяцев назад

      its always malice, no company in the modern era hides info because of embarrassment to them embarrassments are just good coverage until the majority of people "forget" after 24hours.....these new age people might as well have the memory of a goldfish, if you don't maintain training fish just default back to base needs, like the fools who run a good country into the ground for "the greater good"

    • @GoogleDoesEvil
      @GoogleDoesEvil 11 месяцев назад +12

      Or archaic licensing deals from 30+ years ago that are still in effect.

    • @cat-.-
      @cat-.- 11 месяцев назад +9

      Or u don’t want an open source version to float around?

    • @ghost-user559
      @ghost-user559 11 месяцев назад

      Lol so I can have anything in your bank account and retirement accounts right? You don’t have anything to hide and you don’t believe in private property rights, so why not send your life savings to me?

    • @JPS13Laptop
      @JPS13Laptop 11 месяцев назад +1

      @@cat-.- This

  • @duplicake4054
    @duplicake4054 11 месяцев назад +3

    I already knew about this about a month ago because Kaspersky sent me a message saying 'update all your ios devices' and linked to the securelist article (securelist is owned by Kaspersky for clarity)

  • @FoxGrayMusic
    @FoxGrayMusic 11 месяцев назад +8

    Okay so some things to know, it is actually able to find on a device. I had a friend go to federal prison recently and my phone started acting up, I got a voicemessage with this payload ingrained. I actually still have the payload on my computer in a vm for testing. It was an interesting ass process to find, but even more interesting that just based off a friend going to jail a governmental body felt it opened the right to infect close people. I was on IOS 15.6.1 SO UPDATE UPDATE UPDATE!

    • @andrewphi4958
      @andrewphi4958 10 месяцев назад

      Use it for root ) Seriosly, though, it's scary. I'd get rid of any apple shit long ago.

  • @JhnyBravos
    @JhnyBravos 11 месяцев назад +6

    Thank you Jason Tatum for this information

    • @Iceman259
      @Iceman259 11 месяцев назад

      I hate the Celtics but I love FOSS

  • @Zay.FL.
    @Zay.FL. 11 месяцев назад +2

    i used to work at t-mobile around 2020 during lockdown, and a customer brought their iphone in saying somebody was listening and watching everything he does. They basically had 24/7 screenshare and can access root files.

  • @NapanTR
    @NapanTR 11 месяцев назад +5

    Just the other day there were news saying Apple phones were very secure..
    Wondering if this whole thing will hit mainstream news too

    • @fulconandroadcone9488
      @fulconandroadcone9488 11 месяцев назад

      When they get messages with links to blogs describing it they will most likely self destruct on arrival without trace.

  • @janik4546
    @janik4546 11 месяцев назад +1

    What a timing.
    Just saw their C3-talk about them being targeted by this vulnerability.
    Might want to check it out aswell.

  • @hank_lg
    @hank_lg 11 месяцев назад +6

    May I remind the Intel management engine? Which is a part of every Intel processor. It is suspected to be a hardwired backdoor. Same with AMD CPU's.

  • @TreeLuvBurdpu
    @TreeLuvBurdpu 10 месяцев назад +1

    Its not a problem of proprietary software. It's a problem of gov't control over software, which you have aplauded on this channel.

  • @losttownstreet3409
    @losttownstreet3409 11 месяцев назад +7

    If you develop a CPU you need to implement some basic "backdoor": you need to scan the CPU for errors in the production plant. Usually there should be fuses to permanently deactivate these debug functions. Some plants used to cut the part of the chip: but it is expensive to cut some silicon off after the final validation. You see many SOC's where the fuses aren't set because somebody forgot at the production phase and the pushed the last known good working development phase out through the door. It's often timelines where some undocumented function or firmware read/write fuses got forgotten, or every device uses the same master key. You need to sell some iPhones with the debug function enabled to development studios.

    • @nickplays2022
      @nickplays2022 10 месяцев назад +1

      What kind of development studios need debug function enabled?

    • @contactjd
      @contactjd 10 месяцев назад +1

      Reminds me of the AMD Athlon cpu, you could increase the clock speed with a small line of pencil between two points

    • @TechSavy-je4tp
      @TechSavy-je4tp 10 месяцев назад +2

      Development studios, what? This isn't a console or something similar, there's no such a thing as an iPhone devkit. It's just the combo xcode and whatever runs ios.

    • @andrewphi4958
      @andrewphi4958 10 месяцев назад +1

      Dude, you DON'T just "forget" at multi-BILLION ultra-high-tech production where every step is approved, monitored, checked and re-checked multiple times by different people and machines.

  • @mattl6459
    @mattl6459 10 месяцев назад +1

    Great video. Commenting to boost visibility.

  • @gogogomes7025
    @gogogomes7025 11 месяцев назад +31

    If you have something to hide your device should be one of those things, if you have a phone full of "based memes" you better make sure they can't trace it back to you, and your phone should be full of only wholesome as heck memes.

  • @Zemtex22
    @Zemtex22 11 месяцев назад +2

    So McAfee was right? Who would have thought.

  • @texrayvision
    @texrayvision 11 месяцев назад +3

    I've been doing what I've been doing long enough to believe that the NSA has almost certainly approached vendors to do this exact thing. The problem with making a backdoor for the three & four letter boys, is that it does so for everyone else. Give it enough time and it will be their backdoor too.

  • @realcartoongirl
    @realcartoongirl 10 месяцев назад +3

    man i live in cave

  • @truelies5431
    @truelies5431 11 месяцев назад +18

    Tim Apple 🤣

  • @zitoschouten5068
    @zitoschouten5068 9 месяцев назад

    Loving the flolding table setup in the back

  • @accountname7738
    @accountname7738 11 месяцев назад +3

    I'm still not upgrading! I've been waiting years on IOS 16.0 for a jailbreak. Let's hope this exploit can be used to jailbreak my phone and then we can patch it ourselves. :)

  • @centerp1ece
    @centerp1ece 9 месяцев назад +1

    Man Tim Apple is such a good guy

  • @YaroslavFox
    @YaroslavFox 11 месяцев назад +8

    Actually in Russia in special forces, military and other high rank government organizations, it has already been prohibited to use iphones or some androids long ago. However, very few people actually follow these guidelines. Part of this is because alternatives suck.

  • @sodanakin
    @sodanakin 10 месяцев назад +1

    What baffles me is how slow the blue team is.
    This is an old attack. I cannot specify how old due to implications but there are so many more unpatched ones....

  • @piotralex5
    @piotralex5 11 месяцев назад +3

    I worked for small companies, I worked for large companies in software dev. The amount of carelessness, mess, lack of security, self-awareness is so through the roof that it doesn't take CIA || FSB || NSO || ISIS agent to implement a backdoor by kidnapping the CEO's family. You just wait for the laziness of devs or send your own dev to do the thing. Or just log in to their MySQL with root root and put some git and cat commands.

    • @xr.spedtech
      @xr.spedtech 10 месяцев назад

      Yes ...
      It's the same reason for solar winds

    • @JohnSmith-qt4pv
      @JohnSmith-qt4pv 10 месяцев назад

      These are fully functional registers, this isn't an accidental design flaw like some examples FPU or branch prediction errors that can be used for exploits.

  • @alienmajik
    @alienmajik 10 месяцев назад +1

    The biggest back door that is impossible to patch is the human mind social engineering will always rule

  • @VG-or1nu
    @VG-or1nu 11 месяцев назад +77

    I trust kaspersky more now…

    • @imgamerful
      @imgamerful 11 месяцев назад

      Qrd on Kaspersky?

    • @counterr6750
      @counterr6750 11 месяцев назад +20

      Ah, fighting spyware with spyware

    • @kokojack
      @kokojack 11 месяцев назад +15

      Kaspersky always had some of the best malware researchers. Whether to trust them or not, they say they don't have ties with Russian governement but Apple said the same thing so...

    • @nxb00
      @nxb00 11 месяцев назад +2

      ​@@kokojackexcept Kaspersky is based in russia

    • @kokojack
      @kokojack 11 месяцев назад +4

      @@nxb00 Exactly my point

  • @tolkienfan1972
    @tolkienfan1972 11 месяцев назад +2

    None of the vulnerabilities on the page shown had anything to do with spectre or meltdown

  • @Ratzfourtyfour
    @Ratzfourtyfour 11 месяцев назад +18

    iPhone mishaps make me lol. Pay 1 grand to have the glowies in your phone.

  • @goldmantracks
    @goldmantracks 11 месяцев назад +2

    please do an update soon that for 2 days tor exit nodes have been going to Virginia for >48 hours according to several persons

  • @Randomynous01
    @Randomynous01 10 месяцев назад +5

    So basically if the cpu manufacturers have properly designed their products to be secure, none of this could have happened?
    It appears that the problem lies in the very root of the tech system.

    • @GreasinFromHNG
      @GreasinFromHNG 10 месяцев назад

      your not allowed to produce systems impervious to the nsa if you do they will literally kill you

  • @ThisAintIt435
    @ThisAintIt435 11 месяцев назад +1

    Hope everything is well with you. Cheers my friend.

  • @charlestannehill7537
    @charlestannehill7537 11 месяцев назад +3

    Anytime I get shamed for not having an iPhone, I'm going to make them paranoid by telling them this.

    • @hsew
      @hsew 10 месяцев назад +1

      Apple Fanboys deserve every ounce of shame for their devotion; but to be honest this exists on every piece of American tech…

    • @charlestannehill7537
      @charlestannehill7537 10 месяцев назад

      @@hsew that's why I don't do anything on this phone.

  • @Clone394
    @Clone394 11 месяцев назад +1

    I give an A+ for the meme thumbnail.

  • @xDeathMarinex
    @xDeathMarinex 11 месяцев назад +8

    didn't Tesla have this issue also with the ARM architecture in their cars?

    • @harriet-x.x
      @harriet-x.x 11 месяцев назад +1

      tesla used custom AMD chips which had a vulnerability with serial (cant remember wut exactly)

  • @gigantino
    @gigantino 10 месяцев назад +1

    love to see a tech video every now and then instead of US centric ones

  • @TrickyNekro
    @TrickyNekro 11 месяцев назад +5

    I´d say, the ONLY benign explanation is silicon reverse engineering parts that were meant for debugging. That being said... I´m not naive either...

    • @mskiptr
      @mskiptr 11 месяцев назад +2

      poking memory at random goes brrrrrrrrr

  • @smollillith4799
    @smollillith4799 11 месяцев назад

    That thumbnail is a work of art for this situation

  • @cherubin7th
    @cherubin7th 11 месяцев назад +9

    If you insert a back door, you must make it look like an accidental vulnerability. This is the real reason C++ is still used so much.

  • @N-A762
    @N-A762 11 месяцев назад +1

    That thumbnail is awesome

  • @brandonn.1275
    @brandonn.1275 11 месяцев назад +18

    The only backdoor needed is the software update system on iOS. All apple has to do push a single malicious update to all devices to gain access to them and none of us would know about it.

    • @JPS13Laptop
      @JPS13Laptop 11 месяцев назад

      Apple wouldn't be able to hide something like that for long.

    • @brandonn.1275
      @brandonn.1275 11 месяцев назад

      @@JPS13Laptop if they're gonna do something like brick their devices, yeah that would be painfully obvious but something like taking screenshots and recording keyboard input, that's something that a user wouldn't be able to to identify much less detect using a network packet sniffer when that data is discretely sent back using encryption. It's even something that apple can write off as quality assurance telemetry used for improving the iOS ecosystem and users would have 0 evidence to prove the contrary since they wouldn't be able to read the data being sent back.
      Keyboard inputs are already sent back for text prediction, the photos you take that automatically get uploaded to iCloud are reviewed by apple for regulatory compliance, your text messages are processed through Apple servers. Breaking end to end encryption is straightforward for apple and only requires a couple changes of code to grant themselves access and no one else. No one would even notice since the imessage's source code isn't visible to the public.

    • @JPS13Laptop
      @JPS13Laptop 11 месяцев назад

      @@brandonn.1275 There is always a way to read the data coming out of a device. Even the encrypted stuff.

    • @georgek4416
      @georgek4416 11 месяцев назад +1

      "But we didn't do it on purpose! It was just a vulnerability, we took immediate steps to resolve the issue blah blah"

    • @fulconandroadcone9488
      @fulconandroadcone9488 11 месяцев назад

      @@georgek4416 and it can last only of an update cycle, at which point the switch it out and by the time someone figures it was a breach it will be "patched" for a very long time

  • @Lonaticus
    @Lonaticus 11 месяцев назад +1

    Ohh!! Is it time?! For The Fappening 2: Backdoor Boogaloo?

  • @whamer100
    @whamer100 11 месяцев назад +5

    to answer "how did the researchers find these undocumented registers?" thing, after watching enough talks on exploiting hardware like this (notably people like christopher domas), i can guarantee you it just kinda happened by accident by fuzzing the cpu, noticed the system crash after hitting one of the undocumented registers, and then just trial and error until they figure out what it wants. it's happened several times before

  • @vanish3408
    @vanish3408 11 месяцев назад

    Your glowie thumbnails are always on point!

  • @amberhernandez
    @amberhernandez 11 месяцев назад +4

    I remember back around 2016 when the FBI breaching an iPhone was a huge deal.

  • @Yaheeeeee
    @Yaheeeeee 10 месяцев назад

    Very interesting and certainly quite the take on this situation.