| Deutsch English Français Italiano |
|
<100r8ao$m8d$1@nnrp.usenet.blueworldhosting.com> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!weretis.net!feeder9.news.weretis.net!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!nnrp.usenet.blueworldhosting.com!.POSTED!not-for-mail From: Marion <marion@facts.com> Newsgroups: misc.phone.mobile.iphone,comp.mobile.ipad,comp.sys.mac.advocacy Subject: It's too bad the iPhone is the most exploited mobile device in history Date: Sat, 24 May 2025 01:44:57 -0000 (UTC) Organization: BWH Usenet Archive (https://usenet.blueworldhosting.com) Message-ID: <100r8ao$m8d$1@nnrp.usenet.blueworldhosting.com> Injection-Date: Sat, 24 May 2025 01:44:57 -0000 (UTC) Injection-Info: nnrp.usenet.blueworldhosting.com; logging-data="22797"; mail-complaints-to="usenet@blueworldhosting.com" User-Agent: MacSOUP/2.8.5 (ea919cf118) (Mac OS 10.12.6) Cancel-Lock: sha1:JaetGkIyK5gUIMv81y1zF6IuqLk= sha256:E8HyCHGrRXMRzAc3L9QS5GhOMIIXf0rWrBwCwO6pooU= sha1:adSgkidxBeroTE2VL1EpRa0SsLU= sha256:+aJnrq13IjwHvlknj12gMF0ke+AccxYD9h+iyV2CRiI= Bytes: 1990 Lines: 14 Apple has just recently released new software updates across its entire product line to fix multiple security vulnerabilities, which have been actively used to hack customers running its mobile software, iOS. <https://techcrunch.com/2025/04/16/apple-says-zero-day-bugs-exploited-against-specific-targeted-individuals-using-ios/> Notice that Apple has never in its entire history ever caught a zero day bug in their own testing - which - well - which is revealing only in the fact Google proved long ago Apple doesn't actually test most of iOS code! *Google proved iOS core code dating back to 1985 has _never_ been tested!* <https://groups.google.com/g/misc.phone.mobile.iphone/c/nbxvoDgiGT4> With Apple bugfix testing & supporting being the worst in the industry, it's no longer shocking that iOS is the most exploited mobile OS! *Cybersecurity & Infrastructure Security Agency* (Homeland Security) <https://www.cisa.gov/known-exploited-vulnerabilities-catalog>