• meseek #2982@lemmy.ca
      link
      fedilink
      English
      arrow-up
      16
      ·
      1 year ago

      I mean probably the singular best model to date. When the retina screen dropped… wow. I miss Steve 🫶

        • meseek #2982@lemmy.ca
          link
          fedilink
          English
          arrow-up
          3
          ·
          1 year ago

          You know. That was a lot of nothing. My buddies BB did it. Worse. He dropped totally cupping his phone.

          But how Steve handled it was amazing. I was happy with my new phone. And free bumper. And not a dropped call.

          I think the scuffgate on the 5 was waaaaaayyy worse. Literally every phone they were cracking open had dings. Like bad ones. That kicked up a lot less dust than I felt it should

    • The Hobbyist@lemmy.zip
      link
      fedilink
      English
      arrow-up
      32
      ·
      1 year ago

      At a very high level: the attacker sends a picture which somehow is opened by Apple Wallet and leads to the execution of arbitrary code (this is the vulnerability, in how the wallet parses the picture, allowing for a buffer overflow), deactivation of certain security features and download/execution of the malicious payload.

      • p_q@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 year ago

        sure apple wallet is requierd for it to work? red it like the image part can come remotely by picture 0click (by link preview archived) or via using the wallet app, not both in conjunction.

    • bamboo
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 year ago

      Citizen Lab says that the Blastpass is delivered to a victim’s phone via images that are attachments to PassKit, which is a suite of code that allows developers to access Apple Pay infrastructure for their apps. Those images are sent from a phony iMessage account, and when the iPhone processes that image, the hacker has free reign over the victim’s device.

      It’s zero-click because when your iPhone receives the message with the image, it tries rendering the image, which contains the exploit. Once the attacker is in, they usually delete the message that got them access and all traces, so that you don’t know you’re even hacked. This could happen in the middle of the night when you’re sleeping.

      Prior to this update, Lockdown Mode on their iPhones was the only way to protect yourself from this exploit.

  • xtapa@feddit.de
    link
    fedilink
    English
    arrow-up
    6
    ·
    1 year ago

    Phew, I just started looking for my iPhone I don’t have. Brackets saved my sanity.