Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

That's a good one. To be clear, I'm not saying vulnerabilities don't or can't exist in system-extensions. I'm just saying that apple can publish and/or sign iphone extensions for a very limited use case like this, or publish an api/system service to do the same thing, if the concern is 3rd parties. The use case here is reading some memory and exposing that to authorized applications. I concede on the system extension part, but apple can still expose the capability without one.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: