Amazing talk! I wasn't really aware of how modern stuff worked (including Pegasus), and this is kinda scary. I'm not usually one that's pro "Endpoint Security", as a looot of antivirus software is just bad. However, I do think some APIs - especially for diagnostics! - would be approperiate. If you could livestream the process list of high-value devices to a 3rd party server (during creation of the processes, with the server under your control), then there's a really good defense against a lot of attack vectors. I'm kinda for that.
it's baffling that Apple allows plists to contain arbitrary types, let alone dangerous types like NSExpression. it feels like the moral equivalent of unpickling a random .pkl, or the ancient .NET serializer that would instantiate whatever the data asked of it. it almost looked like lambda expressions were nestled in there!
Allowing access to the process list would only force malware makers to hide/mask their processes. When they don't have to, they obviously don't! But yes, the closed nature of iOS make *everything* difficult. (not that the "open" world of Android is perfect either, but at least you have the ability to see what everything is doing.)
Bro that’s why I want to create my own privacy phone like Anom without the NSA back door. This way I’d get everything I’d want and if I could create a mobile OS/phone framework I’d most likely none able to port all of it over to desktop.
Amazing talk! I wasn't really aware of how modern stuff worked (including Pegasus), and this is kinda scary. I'm not usually one that's pro "Endpoint Security", as a looot of antivirus software is just bad. However, I do think some APIs - especially for diagnostics! - would be approperiate. If you could livestream the process list of high-value devices to a 3rd party server (during creation of the processes, with the server under your control), then there's a really good defense against a lot of attack vectors.
I'm kinda for that.
Excellent talk, and despite the omission of some stuff still very well prepared and executed.
it's baffling that Apple allows plists to contain arbitrary types, let alone dangerous types like NSExpression. it feels like the moral equivalent of unpickling a random .pkl, or the ancient .NET serializer that would instantiate whatever the data asked of it. it almost looked like lambda expressions were nestled in there!
Can’t spell NSA without NSArray
Allowing access to the process list would only force malware makers to hide/mask their processes. When they don't have to, they obviously don't! But yes, the closed nature of iOS make *everything* difficult. (not that the "open" world of Android is perfect either, but at least you have the ability to see what everything is doing.)
Bro that’s why I want to create my own privacy phone like Anom without the NSA back door. This way I’d get everything I’d want and if I could create a mobile OS/phone framework I’d most likely none able to port all of it over to desktop.