Deutsch English Français Italiano |
<uvu65t$1g20$1@nnrp.usenet.blueworldhosting.com> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!weretis.net!feeder6.news.weretis.net!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!nnrp.usenet.blueworldhosting.com!.POSTED!not-for-mail From: Mickey D <mickeydavis078XX@ptd.net> Newsgroups: misc.phone.mobile.iphone Subject: Re: Disable iMessage NOW! (Trust Wallet Warns iOS Users About New iMessage Zero-Day Vulnerabilities) Date: Fri, 19 Apr 2024 12:29:49 -0400 Organization: BWH Usenet Archive (https://usenet.blueworldhosting.com) Message-ID: <uvu65t$1g20$1@nnrp.usenet.blueworldhosting.com> References: <uvs00n$cmd$1@nnrp.usenet.blueworldhosting.com> <uvs78b$2glca$1@dont-email.me> <uvthlq$2us07$1@dont-email.me> <uvtnjo$30617$1@dont-email.me> <uvtuvc$1tgq$1@nnrp.usenet.blueworldhosting.com> <uvu16f$31vcr$1@dont-email.me> <uvu21u$r8b$1@nnrp.usenet.blueworldhosting.com> <uvu4fq$331ev$1@dont-email.me> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Injection-Date: Fri, 19 Apr 2024 16:29:50 -0000 (UTC) Injection-Info: nnrp.usenet.blueworldhosting.com; logging-data="49216"; mail-complaints-to="usenet@blueworldhosting.com" User-Agent: MT-NewsWatcher/3.5.3b3 (Intel Mac OS X) Cancel-Lock: sha1:TOgxgMekRNNTp16KnxVC+RADM3o= sha256:SSwqLiebnDYfy+2WA6l3JsmOCDIrvwaM52fXF+elcz8= sha1:ofBH5e1+m/5l2YNP1JR7Qx59KtU= sha256:Rx2sH7gw5p4Tp8Yx5JuRaZELiC50KpDY9Egh/dsysio= Bytes: 3559 Lines: 36 On Fri, 19 Apr 2024 17:00:57 +0100, Chris wrote: >> Non-hacker news has recently been reporting that it could be a false alarm. >> https://www.androidheadlines.com/2024/04/iphone-users-warned-about-imessage-exploit-but-it-could-be-fake.html > > These are all reporting on the Trust Wallet story. That's not a flood, > just an echo. While I disagree with the user who thinks this is all about the M1 flaws, I agree with you that initially, it was widely reported to be so bad that all iOS users were suggested to disable the app to prevent being hacked. You have to take these seriously because iMessage is frequently hacked. https://www.bleepingcomputer.com/news/security/apple-zero-click-imessage-exploit-used-to-infect-iphones-with-spyware/ These iMessages zero-day holes are so frequent, that you have to take them at face value, as almost every one that is reported turns out to be true. https://www.forbes.com/sites/daveywinder/2023/06/02/warning-issued-for-iphone-users-as-ongoing-imessage-0-click-attack-revealed/ Apple is never going to be the first to let you know about its holes, and, in fact, Apple doesn't tell you iOS iMessages holes are on the rise. https://www.nbcnews.com/tech/security/apple-iphone-security-update-points-growing-problem-zero-days-rcna2012 Apple has historically been the last entity to tell users anything about its many iMessages flaws, all of which are due to Apple's lack of testing. https://www.macworld.com/article/227626/imessage-security-flaw-faq.html In this case, the news for days was that iMessages was so seriously broken that users around the world were told to completely disable it in settings. https://cointelegraph.com/news/apple-ios-imessage-zero-day-crypto-exploit-warning-trust-wallet Then, slowly, the news started to report that, while the initial evidence of the $2 million dollar hack is correct - it may be a false alarm. https://appleinsider.com/articles/24/04/18/exploit-seller-wants-2-million-for-a-zero-day-imessage-attack-vector-that-probably-doesnt-exist All we can do now is wait to see whether the advertised $2M hack is real. Or not.