Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

But do they start that process with it being locked? It's one thing to inject code while unlocked and another to take control of a locked phone.


The whole locked phone thing is just a graphical and OS feature. If the OS is vulnerable to a remote injection it might just as easily bypass the locked state.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: