Deutsch   English   Français   Italiano  
<ut7p0q$10ih8$1@paganini.bofh.team>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!3.eu.feeder.erje.net!2.eu.feeder.erje.net!feeder.erje.net!paganini.bofh.team!not-for-mail
From: Sten deJoode <StendeJood@nospam.net>
Newsgroups: misc.phone.mobile.iphone,comp.sys.mac.system,comp.mobile.ipad
Subject: Re: Are iPhones subject to ransomware attacks?
Date: Sun, 17 Mar 2024 17:57:45 -0400
Organization: To protect and to server
Message-ID: <ut7p0q$10ih8$1@paganini.bofh.team>
References: <ut26gf$2e534$1@dont-email.me> <l5jvq8Fj8sdU1@mid.individual.net> <ut45bs$itts$1@paganini.bofh.team> <l5lsi4Fs60gU1@mid.individual.net>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 8bit
Injection-Date: Sun, 17 Mar 2024 21:57:47 -0000 (UTC)
Injection-Info: paganini.bofh.team; logging-data="1067560"; posting-host="KwzIAAXG6Ff1eRCAVfbVhg.user.paganini.bofh.team"; mail-complaints-to="usenet@bofh.team"; posting-account="9dIQLXBM7WM9KzA+yjdR4A";
User-Agent: 40tude_Dialog/2.0.15.41 (Beta 38)
Cancel-Lock: sha256:NSOcFZug1Wsh4yl/zfSCMyyUNMul1mgLHAaRcLSO+/s=
X-Notice: Filtered by postfilter v. 0.9.3
Bytes: 4208
Lines: 66

On 16 Mar 2024 15:35:32 GMT, Jolly Roger wrote:

>>> To be successfully attacked by malware, a Mac user must interactively
>>> download the malware to their computer
>>
>> That's dead wrong.
> 
> Nope, it's correct.

No Jolly Roger. You're dead wrong. 
<https://www.google.com/search?q=apple+zero+click+exploit>

Q: *Why are you dead wrong?*
A: Because you are ignorant. 
A: Because you're an Apple fanatical nut case.
A: Because your IQ is lower than half of normal.
   (Pick one to three, but no more than three.)
<https://www.forbes.com/sites/forbestechcouncil/2024/01/03/the-pegasus-wake-up-call-iphone-security-in-the-face-of-zero-click-exploits/>

 *You never read anything about Apple that Apple didn't feed you*, JR.

HINT: *To own an Apple product is to ALREADY be exploited*, JR.
<https://apnews.com/article/technology-business-canada-software-hacking-dc3eebaf4a4879e8ad714ce03f89e9d9>

Apple's not going to advertise they have twice to three times as many
zero-day holes as Android has, silly. 

It's not in Apple's DNA to tell the truth. (Witness the recent half a
billion dollar settlement just this week for Tim Cook's recent lies.)

There are very many zero-click exploits in both macOS & iOS, JR.
Most of them are in Apple's shitty kernel & many in the even worse webkit.
<https://techwireasia.com/09/2023/what-does-the-security-alert-on-apple-software-zero-click-spyware-mean/>

In fact, just the known exploits of iOS are ten times that of Android.
https://www.cisa.gov/known-exploited-vulnerabilities-catalog

>> There have been *plenty* of zero-day zero-click no-interaction holes
>> in Apple's operating systems
> 
> There have been plenty of zero days in *all* operating systems

Idiot. These are Apple newsgroups, Jolly Roger.
<https://www.popsci.com/technology/zero-click-hacks-explained/>

You're like nospam was, Jolly Roger, before his contract with Apple expired
(his job was to contradict EVERY SINGLE FACT about Apple products).

Not only does iOS have ten times more exploits than Android, but iOS and
macOS also have more zero-click exploits (& getting worse every year).

For you to claim (as you did) that only Apple doesn't have zero-click
exploits shows how much of a fanatical nut case you are, since nobody who
isn't a fool would claim like you did above that Apple doesn't have them,
particularly in the crappy webkit and crappy kernel (which is where most of 
them are).
<https://citizenlab.ca/2023/09/blastpass-nso-group-iphone-zero-click-zero-day-exploit-captured-in-the-wild/>

Apple doesn't even know how to write a kernel, for heaven's sake.
https://www.darkreading.com/ics-ot-security/patch-now-apple-zero-day-exploits-bypass-kernel-security

The messaging system of Apple also has many of the zero-click exploits.
https://threatpost.com/pegasus-spyware-uses-iphone-zero-click-imessage-zero-day/168899/

But most zero clicks are in Apple's shitty kernel and crappy webkit code.
<https://www.darkreading.com/ics-ot-security/patch-now-apple-zero-day-exploits-bypass-kernel-security>