Yes it is but they could only get into the Phone because They Programmed The Phone to Run The GIF Outside of the Blast Door that was supposed to Stop That kind of Attack
@@PIPPIPPIPPIPPIPPIP still a mess. A clean strong security doesn't seem like a priority. It's always about patching up all exploits at the end, after they make the functionality however they want
please turn down the music. i understand and get it that you want us to be able to shazam the music in witch case just post a comment and tell us what the song is and where to get it.
Question; the major concern, even with patching, is: do the patches actually remove the infection, or just prevent it? Does “Lockdown Mode” remove the infection? And will Pegasus of the 2020’s still survive hard reset? Do you all know the answer to this? Apple should develop those resources into being able to eviscerate the infection.
Patches almost never remove malware from any device, iOS, Android, mac, Windows, or Linux. Patches simply fix vulnerabilities that were used for initial access and or privilege escalation. Lockdown mode just reduces the attack surface that was used for initial access to install it, again, it does not remove it. Like most malware, factory reset can remove it, but since its so easy to install with zero click exploits, the spyware operators will just reinstall it.
@@realtimecyber Thank you for your response. I agree that they’ll just spear the device again, but these measures aren’t proactive is my disappointment in Apple. Hopefully they add in their own threat detection and arm the devices and Apple stores with removal tools. Also, I thought Pegasus showed reboot/reset persistence?
@@FatJoesSon Anti-virus and anti-malware capabilities would help but those aren't foolproof either. Fileless malware commonly evades detection of Windows defender and other 3rd party antivirus/anitmalware. To survive a reboot some of its code just needs to be stored outside the RAM. The reason factory reset doesn't work is because Pegasus likely gains access to cloud accounts that it can use to reinfect, also the operators could simply program their command and control servers to send another zero-click exploit if they lose communication with the phone.
@@realtimecyber I agree, I’m not trying to oversimplify it, but I really think Apple (over any phone developer, or 3rd party anti-virus), if anyone, can do better. They also should be motivated to go proprietary to control the smartphone anti-virus market with their own product, since no one really does. I think it’s just brand longevity for the new world in the coming, very sophisticated decades. Yet, what you said makes total sense. Thank you for your insight and guidance, I just thought you would be interesting to talk with. Last question, would you (or someone you know) be willing to do a cybersecurity consult, for an individual? I am on a project team where we have received concerning files on certain iOS apps, and we are not CS/IT, security, or forensics, and would like to get them checked.
@@FatJoesSon We do offer cybersecurity consulting. Fill out our consultation form at realtimecyber.net and we'll connect. We do have people that can help with this. (just updated our website, it takes a sec to load...)
The zero click exploits are very sophisticated and the commercial spyware licenses are very expensive so its very unlikely most phones are being targeted, unless you are a person of interest like a journalist or activist against a client government.
the federal government said last year that flying a gadsden flag makes you a terrorist. yet my state offers gadsden license plates. .. lets be real here, existing makes you an enemy of the government.@@realtimecyber
@@realtimecyber if you've used a real name online and you've expressed an opinion, you've been against someone at some point. You've also likely been within a certain number of degrees (~3) of contact to someone who has likely voiced views that would be considered political violence to some. That's enough for you to be surveilled with the patriot act.... Other countries don't have such limitations on degrees of association
Thanks for the feedback. Unfortunately we cant edit the sound once videos are posted, we've reduced the music volume level in newer videos based on everyone's feedback.
icloud "partition" what tf are you talking about, a partition is part of a hard drive, i cloud is an online service. stop reading bs and actually get a clue ?
@@SyrianSpace Its unlikely given Google/RUclips's tight security controls. But we cannot rule it out completely. An attack like that would seem to fall into the watering hole attacks family. Watch our video on Candiru Spyware to learn more and make sure to subscribe!
@@realtimecyber When an ancient issue like a .gif takes a modern Apple south, I wouldn't count anything out. And forget about any dealer diagnostic software giving you any direct feedback on serious issues. Android next.
Most convincing TTS i've heard so far
Didn't pass the turing test?
@@realtimecyber thanks for teaching me what Turing is.
3:50 jumpscare alert
Mini heart attack 03:49
Keeping you awake! 🤣
Maxi one here
Honestly it seriously scared me...
@@vkb9013 One of our first videos, we've toned down the noises since.
@@realtimecyber Thank you! Great video as well.
In conclusion, security is a mess
Yes it is but they could only get into the Phone because They Programmed The Phone to Run The GIF Outside of the Blast Door that was supposed to Stop That kind of Attack
@@PIPPIPPIPPIPPIPPIP still a mess. A clean strong security doesn't seem like a priority. It's always about patching up all exploits at the end, after they make the functionality however they want
seurity is a lie sold to you so that those in power can horde as many exploits as possible, in order to exert control they dont deserve.
Explain
Or rather security is not secure
please turn down the music.
i understand and get it that you want us to be able to shazam the music in witch case just post a comment and tell us what the song is and where to get it.
Why the heck is it today still possible to make an overflow (which one ever)? I thought this was an issue back in the nineties but it's 2024!
Great video!
Good research, and understanding. Well done 👍🏻.
Question; the major concern, even with patching, is: do the patches actually remove the infection, or just prevent it? Does “Lockdown Mode” remove the infection? And will Pegasus of the 2020’s still survive hard reset? Do you all know the answer to this?
Apple should develop those resources into being able to eviscerate the infection.
Patches almost never remove malware from any device, iOS, Android, mac, Windows, or Linux. Patches simply fix vulnerabilities that were used for initial access and or privilege escalation. Lockdown mode just reduces the attack surface that was used for initial access to install it, again, it does not remove it. Like most malware, factory reset can remove it, but since its so easy to install with zero click exploits, the spyware operators will just reinstall it.
@@realtimecyber Thank you for your response. I agree that they’ll just spear the device again, but these measures aren’t proactive is my disappointment in Apple. Hopefully they add in their own threat detection and arm the devices and Apple stores with removal tools.
Also, I thought Pegasus showed reboot/reset persistence?
@@FatJoesSon Anti-virus and anti-malware capabilities would help but those aren't foolproof either. Fileless malware commonly evades detection of Windows defender and other 3rd party antivirus/anitmalware. To survive a reboot some of its code just needs to be stored outside the RAM. The reason factory reset doesn't work is because Pegasus likely gains access to cloud accounts that it can use to reinfect, also the operators could simply program their command and control servers to send another zero-click exploit if they lose communication with the phone.
@@realtimecyber I agree, I’m not trying to oversimplify it, but I really think Apple (over any phone developer, or 3rd party anti-virus), if anyone, can do better. They also should be motivated to go proprietary to control the smartphone anti-virus market with their own product, since no one really does. I think it’s just brand longevity for the new world in the coming, very sophisticated decades.
Yet, what you said makes total sense. Thank you for your insight and guidance, I just thought you would be interesting to talk with.
Last question, would you (or someone you know) be willing to do a cybersecurity consult, for an individual? I am on a project team where we have received concerning files on certain iOS apps, and we are not CS/IT, security, or forensics, and would like to get them checked.
@@FatJoesSon We do offer cybersecurity consulting. Fill out our consultation form at realtimecyber.net and we'll connect. We do have people that can help with this. (just updated our website, it takes a sec to load...)
dude this actually slaps
We are all walking around with hacked phones. Damn.. Windows all over again
The zero click exploits are very sophisticated and the commercial spyware licenses are very expensive so its very unlikely most phones are being targeted, unless you are a person of interest like a journalist or activist against a client government.
the federal government said last year that flying a gadsden flag makes you a terrorist. yet my state offers gadsden license plates. .. lets be real here, existing makes you an enemy of the government.@@realtimecyber
@@realtimecyber if you've used a real name online and you've expressed an opinion, you've been against someone at some point. You've also likely been within a certain number of degrees (~3) of contact to someone who has likely voiced views that would be considered political violence to some. That's enough for you to be surveilled with the patriot act.... Other countries don't have such limitations on degrees of association
Your voice makes it interessting😁
Thanks for the feedback. Make sure to subscribe for more!
Great vid!
Same here. Really commited to watch till the end, but music is way too loud. Watchminutes lost :( well done for your research though
Thanks for the feedback. Unfortunately we cant edit the sound once videos are posted, we've reduced the music volume level in newer videos based on everyone's feedback.
Can zero click be sent by vinted chat and other sales platforms?
I'm not familiar with that platform, but it likely can.
WHY IS THE BACKROUND MUSIC SO LOUD?
It was one of the first videos we made
Oh
Musik is to loud ! to focus or even unterstand what is being said.
Thanks for the feedback.
I thought my phone was hacked at 3:50
6:36 that's crazy
👍
Glad you enjoyed it.
The Feds use it....go figure
Oh nyo
iam waiting for -1 click exploit
🤣
When shit sits in the system files hard reset wont work- only system reinstalling would do the job
If you made it on the wrong target list, good luck even with your new phone.
icloud "partition" what tf are you talking about, a partition is part of a hard drive, i cloud is an online service. stop reading bs and actually get a clue ?
You're mean?
I am @@SavannahSunshine49
3:50 WTF?
Making sure you're awake!
@@realtimecyber Thanks for the video though!
@@realtimecyber is it possible for zero-click attack to occur by watching a RUclips video? because it appears that everything hackable!
@@SyrianSpace Its unlikely given Google/RUclips's tight security controls. But we cannot rule it out completely. An attack like that would seem to fall into the watering hole attacks family. Watch our video on Candiru Spyware to learn more and make sure to subscribe!
@@realtimecyber When an ancient issue like a .gif takes a modern Apple south, I wouldn't count anything out. And forget about any dealer diagnostic software giving you any direct feedback on serious issues. Android next.
😅😅😅 Should of studied harder