38C3 - From Pegasus to Predator - The evolution of Commercial Spyware on iOS

Поделиться
HTML-код
  • Опубликовано: 31 янв 2025

Комментарии • 6

  • @Fs3i
    @Fs3i 27 дней назад +12

    Amazing talk! I wasn't really aware of how modern stuff worked (including Pegasus), and this is kinda scary. I'm not usually one that's pro "Endpoint Security", as a looot of antivirus software is just bad. However, I do think some APIs - especially for diagnostics! - would be approperiate. If you could livestream the process list of high-value devices to a 3rd party server (during creation of the processes, with the server under your control), then there's a really good defense against a lot of attack vectors.
    I'm kinda for that.

  • @mojoblues66
    @mojoblues66 19 дней назад +2

    Excellent talk, and despite the omission of some stuff still very well prepared and executed.

  • @voxelsofsorrow
    @voxelsofsorrow 15 дней назад +1

    it's baffling that Apple allows plists to contain arbitrary types, let alone dangerous types like NSExpression. it feels like the moral equivalent of unpickling a random .pkl, or the ancient .NET serializer that would instantiate whatever the data asked of it. it almost looked like lambda expressions were nestled in there!

  • @jfbeam
    @jfbeam 10 дней назад

    Allowing access to the process list would only force malware makers to hide/mask their processes. When they don't have to, they obviously don't! But yes, the closed nature of iOS make *everything* difficult. (not that the "open" world of Android is perfect either, but at least you have the ability to see what everything is doing.)

    • @YourFavoriteHacker8666
      @YourFavoriteHacker8666 7 дней назад

      Bro that’s why I want to create my own privacy phone like Anom without the NSA back door. This way I’d get everything I’d want and if I could create a mobile OS/phone framework I’d most likely none able to port all of it over to desktop.