we have a complete operating system with full access to the phone main memory, without any exploit mitigation, which automatically trusts every instruction it receives from the base station you’re connected to. What could possibly go wrong?
Sapere Aude
we have a complete operating system with full access to the phone main memory, without any exploit mitigation, which automatically trusts every instruction it receives from the base station you’re connected to. What could possibly go wrong?