Тёмный

They Found The iPhone Backdoor 

Mental Outlaw
Подписаться 632 тыс.
Просмотров 411 тыс.
50% 1

In this video I discuss the TriangleDB attack chain that allowed hackers to completely compromise iPhones starting with a zero click exploit and ending with a bypass of Apples hardware based memory protection.
Read more about it from Kaspersky
securelist.com/triangledb-tri...
My merch is available at
based.win/
Subscribe to me on Odysee.com
odysee.com/@AlphaNerd:8
₿💰💵💲Help Support the Channel by Donating Crypto💲💵💰₿
Monero
45F2bNHVcRzXVBsvZ5giyvKGAgm6LFhMsjUUVPTEtdgJJ5SNyxzSNUmFSBR5qCCWLpjiUjYMkmZoX9b3cChNjvxR7kvh436
Bitcoin
3MMKHXPQrGHEsmdHaAGD59FWhKFGeUsAxV
Ethereum
0xeA4DA3F9BAb091Eb86921CA6E41712438f4E5079
Litecoin
MBfrxLJMuw26hbVi2MjCVDFkkExz8rYvUF

Наука

Опубликовано:

 

28 дек 2023

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 1,8 тыс.   
@user-eh8oo4uh8h
@user-eh8oo4uh8h 5 месяцев назад
Not saying it was a backdoor. But if I wanted to code a backdoor, this is what I would have done.
@ViatoremDiEfa
@ViatoremDiEfa 5 месяцев назад
It’s really a feature and not a bug in this case.
@TheOfficialOriginalChad
@TheOfficialOriginalChad 5 месяцев назад
You would have coded it to require a 10 stage chain of exploits , across multiple development teams and computer design engineers? If it were your job, you would be very bad at it.
@Muhammad-sx7wr
@Muhammad-sx7wr 5 месяцев назад
Now that Intel is ramping up manufacturing in that country, you can be assured that more hidden instructions will be put into the processors below level zero.
@ekkekristo
@ekkekristo 5 месяцев назад
🤣
@FrontierGamers
@FrontierGamers 5 месяцев назад
​@@TheOfficialOriginalChad good backdoors aren't easy to find, the point is only you know about it
@hyp0thet1cal
@hyp0thet1cal 5 месяцев назад
So the alleged backdoor is a set of registers in the processor that can directly write to and read from the memory while there is no other reason for these registers to exist. Sounds eerily similar to the Intel Management Engine or the AMD PSP. Definitely a coincidence how every major chip manufacturer added the same type of vulnerability to their products, 3 letter agencies are most certainly not involved.
@Tycy2014
@Tycy2014 5 месяцев назад
There is a vulnerable to hitting the like button on RU-vid... you did not hear that from me thou
@catmanmliolunny
@catmanmliolunny 5 месяцев назад
@@Tycy2014 EXPLAIN GOOD SIR.
@Tycy2014
@Tycy2014 5 месяцев назад
@catmanmliolunny anytime there is a handshack between 2 users it uploads that into RU-vids data if you have a payload hidden behind your comments like button (if you already ran a sql injection on your comment) you can than have your like button carry payloads to other users and use assembly root functions to brute force your way or key loggers your way into others systems or get there internet traffic. The way you determine your like buttons url is by using Google Dorks to find the exact location of your comment... this is a multi step process Edit: I'm working on multiple cves right now using hidden payloads to find locations of people, all you need is the hand shack and a man in the middle function, and you can go crazy Edit: it's like giving cookies but only if you don't have access to their system.... if I wanted I could find out where you live given enough time. Or I could use social engineering to get the same results.
@kphaxx
@kphaxx 5 месяцев назад
@@Tycy2014 Worked like a charm, thanks homie
@Tycy2014
@Tycy2014 5 месяцев назад
@@kphaxx oh no
@jer1776
@jer1776 5 месяцев назад
Makes you wonder just how many of these "vulnerabilities" exist.
@junyaiwase
@junyaiwase 5 месяцев назад
Enough that if you knew how many you’d want to never tap a phone again! But lets hope most of them are undiscovered (for now)
@aishalotter9995
@aishalotter9995 5 месяцев назад
@@junyaiwaseyup I won’t own a mobile tracking device even a handheld one let alone the next generations , wearable , implantable , last but not least grown into your fucking brain !!!
@ivy8483
@ivy8483 5 месяцев назад
@@junyaiwaseoh boy , it’s just the beginning I’m afraid
@Slay_No_More
@Slay_No_More 5 месяцев назад
This is just the stuff we hear about.
@VallisMansonOfficial
@VallisMansonOfficial 5 месяцев назад
Let's talk about how many iPhone exploits are the same as Mac computer exploits that still haven't been patched; find them, and you'll destroy Apple in a day. I wish I was joking, yet here we are..
@nothingtoseehere449
@nothingtoseehere449 5 месяцев назад
hope the glow boys enjoyed watching me goon at 4am
@DiogenesTheCynic.
@DiogenesTheCynic. 5 месяцев назад
kek
@frenchy3688
@frenchy3688 5 месяцев назад
Based
@m4x899
@m4x899 5 месяцев назад
Hahaha absolutely insane
@RinaShinomiyaVal
@RinaShinomiyaVal 5 месяцев назад
Theyll probably save some of it for themselves no doubt. :)
@StarlordStavanger
@StarlordStavanger 5 месяцев назад
Goon?
@atomicskull6405
@atomicskull6405 5 месяцев назад
"Don't worry, as long as we keep the backdoor a secret nobody will ever find it" Problem with that is that hackers and hostile states will from now on just assume there's a backdoor and look for it tirelessly.
@shinyrayquaza9
@shinyrayquaza9 5 месяцев назад
this is the exact issue I hated in the earn it act, putting a back door for the government means everyone can get that backdoor
@hollowgonzalo4329
@hollowgonzalo4329 5 месяцев назад
@atomicskull6405 They didn't stumble across anything. Pegasus is Israeli. They either have insiders at various American glow bro organizations or they bribe and blackmail their way into getting access to le secret spy codes.
@gravyd316
@gravyd316 5 месяцев назад
There's always, and I mean always a back door.
@CentroidYT
@CentroidYT 5 месяцев назад
@@gravyd316not true
@George-ej4ju
@George-ej4ju 5 месяцев назад
Or have someone sell the secret to them. Which us probably what they did
@gwky
@gwky 5 месяцев назад
Apple users: "Umm, actually, it's a feature to protect me."
@sigma5088
@sigma5088 5 месяцев назад
"We're the resistance, this backdoor is only to stop the bad people from using iPhones."
@X1ZR
@X1ZR 5 месяцев назад
Nah, f no. I dislike Apple because of their bs and lies.
@ClickClack_Bam
@ClickClack_Bam 5 месяцев назад
"It's to make the battery work better on older phones."
@user-gt2th3wz9c
@user-gt2th3wz9c 5 месяцев назад
​@@X1ZRdo we even have something secure? I mean intel me work regardless of your os
@njpme
@njpme 5 месяцев назад
​@@user-gt2th3wz9cNo. Nothing is
@TurntableTV
@TurntableTV 5 месяцев назад
Tim Cook: "Yeah, but sideloading is way more dangerous to our users security."
@Stone_624
@Stone_624 5 месяцев назад
Image more than one thing being true at the same time.
@hendrx
@hendrx 5 месяцев назад
@@Stone_624 except the sideloading part isn't true, you can always make it difficult for amateurs to sideload, they just want their 30% cut.
@intron9
@intron9 5 месяцев назад
"sideloading" what a stupid name they made. Why is it allowed on Macs then?
@MRJMXHD
@MRJMXHD 5 месяцев назад
I've been using Android for the past 6 years. And in that time, half of the apps I use are pirated, sideloaded apps. Never in this time have I ever been infected with malware, because well, I use my brains when sideloading. @@Stone_624
@tsunekakou1275
@tsunekakou1275 5 месяцев назад
​@@Stone_624 imagine you know nothing about sideloading and make a dumb comment.
@Mr.Riojas
@Mr.Riojas 5 месяцев назад
Deniability by the US is harder when they have been caught doing so many other behind the scenes spying... such as on social media.
@12time12
@12time12 5 месяцев назад
Who cares what the Russians think? They can whine all day, it’s not like they wouldn’t conduct similar tactics.
@moonasha
@moonasha 5 месяцев назад
I mean, is there a government out there that doesn't do this crap?
@VallisMansonOfficial
@VallisMansonOfficial 5 месяцев назад
Exactly
@ketelin4285
@ketelin4285 5 месяцев назад
@@moonasha most are very primitive and all but a handfull don't have aceess to global firms with bilions of users . it's a matter of exposure scale
@haplon33
@haplon33 5 месяцев назад
stuxnet
@archstanton3931
@archstanton3931 5 месяцев назад
I remember working with assembly in school. Never thought I'd hear the term "unused registers" lol.
@hanelyp1
@hanelyp1 5 месяцев назад
Undocumented bit combinations in the machine code might hint at undocumented registers in the hardware. But figuring out special functions for those registers would be tricky. Unused space in the instruction set, on the other hand, is common.
@JohnDlugosz
@JohnDlugosz 5 месяцев назад
Not like the general purpose registers on the CPU -- probably talking about registers in the SoC, written to with a special instruction or memory mapped at some hardware address. Writing to it controls certain aspects of the various things in the System on a Chip.
@Muhammad-sx7wr
@Muhammad-sx7wr 5 месяцев назад
It exists in Intel and AMD. Undocumented instructions.
@andrewdunbar828
@andrewdunbar828 5 месяцев назад
We normally call them "undocumented registers". And they would refer to registers in hardware devices, not the CPU registers. Though even in the 8-bit days there were undocumented registers or partially documented registers, and modern CPUs are orders of magnitude more complex, often with multiple CPU cores in them, so a lot more places to hide undocumented registers. Undocumented opcodes are extremely common.
@andrewdunbar828
@andrewdunbar828 5 месяцев назад
@@Muhammad-sx7wr Always has.
@rb2530
@rb2530 5 месяцев назад
At one time, I worked with a network engineer that used to be in the Military. He had access to MS Source Code, not OP code, but the uncompiled Source Code. He said the military would not allow any device or software into their secure areas unless they had full control of it. He also said that the only sure way to defend a device was to remove external access. This includes having shielded hardware so it cannot be accessed via a remote, directional device that utilizes it's own EM broadcast to reach into your Hardware. Sci-Fi stuff huh? This was 28 years ago. Imagine what they can do now....
@dan00b8
@dan00b8 5 месяцев назад
That is so cool... too bad we are not presented this choice either, and have to deal with this bs
@Zaro2008
@Zaro2008 5 месяцев назад
Whats OP code?
@canaldecasta
@canaldecasta 5 месяцев назад
Didnt understand half of it but that sounds badass
@sirtra
@sirtra 5 месяцев назад
28 years ago was the era of 14.4k baud modems, cd-roms were connected through soundcards and this new OS called Windows 95 had just been released. There were no cell phones nor the concept of "devices" or "network engineers" It would also make you at least 40 years old today and old enough to not be so gullible or make up fake stories. What would having access to the source code do? Fork and compile their own version of win95 with the same undiscovered vulnerabilities as that is safer? 😂
@hanelyp1
@hanelyp1 5 месяцев назад
@@sirtra it's not foolproof, but having source code to inspect makes it a lot harder to slip in a back door.
@camelotenglishtuition6394
@camelotenglishtuition6394 5 месяцев назад
Saw the triangulation presentation last night.. it's very clearly a backdoor.. and what was interesting is that it's been used for 10 years .. also the fact you can write to your own memory address if you know a "secret code " is fucking bananas
@LewyM7
@LewyM7 5 месяцев назад
Link?
@Popcorn_Pillow
@Popcorn_Pillow 5 месяцев назад
Dang I wanna see.
@camelotenglishtuition6394
@camelotenglishtuition6394 5 месяцев назад
@@LewyM7 below dude
@UNcommonSenseAUS
@UNcommonSenseAUS 5 месяцев назад
#secret code 😂😂😂
@UNcommonSenseAUS
@UNcommonSenseAUS 5 месяцев назад
No link showing up bruh
@mtallen56
@mtallen56 5 месяцев назад
The Pegasus exploit was actually insane, they used the fact that the steps of the gif compression algorithm were Turing complete, along with an exploit that let them execute an arbitrary number of steps of that algorithm, to build a computer out of the compression algorithm. When combined with the overflow exploit giving them access to the devices memory they had full control of the phone.
@zekiz774
@zekiz774 5 месяцев назад
Yeah that really doesn't sound like it was planned. And the unused registers probably were there for redundancy or they simply were left overs from the development.
@sn00pysfone
@sn00pysfone 5 месяцев назад
Smart mfs doing stuff like this meanwhile I’m proud of my crud b2b saas. Feels bad.
@Spiney09
@Spiney09 5 месяцев назад
@@zekiz774people here would rather attribute to malice something that can easily be explained as an oversight in an insanely complicated system. I’m really not apples biggest fan, but jumping to accusing them of conspiracy is unhinged.
@ryzikx
@ryzikx 5 месяцев назад
@@sn00pysfonesmart people push the world forwards, were just along for the ride
@amandahugenkiss
@amandahugenkiss 5 месяцев назад
Pegasus is actually pretty beautiful from a coding perspective.
@sim00n99
@sim00n99 5 месяцев назад
Its pretty funny, considering several defence contractors and official defense departments around the world have contracts with apple to use iphones with IOS as their provided mobile devices, as well as Imessage as one of the primary comunication application.
@mycommentmyopinion
@mycommentmyopinion 5 месяцев назад
I wonder if they get patched version of ios, that don't have these vulns
@BiblicallyAccurateToaster
@BiblicallyAccurateToaster 5 месяцев назад
​​​​​@@mycommentmyopinion imo unlikely. Someone within govt wanted total possible oversight over these contractors & defense depts by forcing then to use iphones & imessage they insured this happened. Imo this was an intentional backdoor sponsored by the US govt.
@xE92vD
@xE92vD 5 месяцев назад
funny how the government actually trusts closed source software for critical and sensitive stuff.
@dangerous8333
@dangerous8333 5 месяцев назад
Not that funny if you consider their versions are probably a lot different than the consumer models.
@GardenofEdens
@GardenofEdens 5 месяцев назад
​@@dangerous8333 I would believe it's only the hardware with specialized software, but if not it seems like a bigger problem.
@fetyrol7108
@fetyrol7108 5 месяцев назад
It's about time. The walled garden is breached
@Elinzar
@Elinzar 5 месяцев назад
Everything is breached
@thecon_quererarbitraryname6286
@thecon_quererarbitraryname6286 5 месяцев назад
The walled garden was never one to begin with (at least to the alphabet bois and NSO 😂)
@DanteMishima
@DanteMishima 5 месяцев назад
There has never been a wall, just a fence
@notafbihoneypot8487
@notafbihoneypot8487 5 месяцев назад
Remeber guys, if they say its the most secure with no open source software, Its not
@muhammadsubhani7420
@muhammadsubhani7420 5 месяцев назад
People should look at Mattermost application open source for self-hosted end to end encrypted messaging. It's like Slack for developers, used for secure communications by Airforce, Samsung, and more.
@GrueneVanilleWaffel
@GrueneVanilleWaffel 5 месяцев назад
And Hardware?
@muhammadsubhani7420
@muhammadsubhani7420 5 месяцев назад
@@GrueneVanilleWaffel Truly difficult finding OS hardware because the scale of production it takes a hardware company to be profitable is a long time horizon and huge amounts of capital. While you can find some OS hardware, you can do a surprising amount of interesting things running with Virtual Machines if you really know what you're doing. Remember, the more convenient/usable the product, the more hackable it is. OG cybersecure guys run many systems straight from the Command Line on an old Thinkpad laptop as a controller for a big server farm, but you have to know what you're doing.
@fulconandroadcone9488
@fulconandroadcone9488 5 месяцев назад
If you don't need a specific app and it might have a security vulnerability and you can't remove it the only think you can really do is not use the entire thing.
@nosidenoside2458
@nosidenoside2458 5 месяцев назад
No, they found *A* backdoor. Proprietary software is proprietary.
@balllord3546
@balllord3546 5 месяцев назад
reverse engineering doesnt exist apparently
@thewhitefalcon8539
@thewhitefalcon8539 5 месяцев назад
Not with Ghidra it's not.
@Takyodor2
@Takyodor2 5 месяцев назад
@@thewhitefalcon8539 If you buy a device with the software instead of installing it yourself, not even Ghidra can help you. If (and the size of that if may vary) the device lets you download the software off of it in order to decompile it, you have to trust that the hardware gives you the same code as whats running.
@detecta
@detecta 5 месяцев назад
i think its a jab at the fact iphones are considered "the most secure phone"
@orangejjay
@orangejjay 5 месяцев назад
​@@detecta100% this. Apple does an awesome job of keeping it's cult brainwashed and loyal. Just like when they used to say "Macs don't get viruses." 😂
@asdion
@asdion 5 месяцев назад
>a blackbox has horrible vulnerabilities? Oh shucks matey i could not have possibly expected something like that
@dan00b8
@dan00b8 5 месяцев назад
I mean an open box also has horrible vulnerabilities... A little harder to make them intentional like in blackbox, but Minnesota Linux kernel ban situation kinda proved it to be possible...
@surewhynot6259
@surewhynot6259 5 месяцев назад
Unfortunately, there are plenty of horrible vulns even in open source. A couple of sudo vulns went undiscovered for over a decade, and these led to full privilege escalation.
@asdion
@asdion 5 месяцев назад
@@surewhynot6259 The point was rather, all software has vulnerabilities, and making it closed source makes things worse.
@chrisdawson1776
@chrisdawson1776 5 месяцев назад
Couldn't you bypass any Linux system by pressing backspace 20 something times?
@asdion
@asdion 5 месяцев назад
@@chrisdawson1776 That really was not as big of a deal as people made it out to be, if someone got into the position to exploit that vulnerability you had already lost at every step because the person is literally standing in-front of your system. Generally exploits that require physical access to the system are more of a joke than anything since at that point there are countless non exploit ways to get into the system. But most importantly, that exploit is for GRUB2 if you encrypt your system (if you want password protection on your OS) getting past GRUB2 is going to be utterly worthless. As is i'd bet 99% of users do not have a password set for GRUB2, same goes for corporations (at least those i worked for) because it's simply unnecessary and in a corporate environment you don't want to be locked out of your boot loader with a password. TLDR: that exploit was overblown lwn.net/Articles/668695/
@CentreMetre
@CentreMetre 5 месяцев назад
My face when closed source software isnt the most secure thing in the world
@GrueneVanilleWaffel
@GrueneVanilleWaffel 5 месяцев назад
Hardware
@knight808.
@knight808. 5 месяцев назад
@@GrueneVanilleWaffelhe means iOS but yea you’re both right
@CentreMetre
@CentreMetre 5 месяцев назад
@@GrueneVanilleWaffel wdym by hardware? Not disagreeing just have no clue what you mean
@DinahAO
@DinahAO 5 месяцев назад
@@CentreMetresoftware is any sort of application within the device. hardware is the actual device itself and all its parts. a good way to remember it is, if the equipment can be touched it’s hardware, if it cannot it is software
@CentreMetre
@CentreMetre 5 месяцев назад
@@DinahAO I know the difference between hardware and software. I just dont get why he meant by the word "hardware"
@nonetrix3066
@nonetrix3066 5 месяцев назад
This isn't about software, you could run 100% free software, and yet your CPU would still be backdoored. And you know that AMD and Intel both have it too, likely other ARM manufacturers too, who knows which are safe if any
@9eleven1877
@9eleven1877 5 месяцев назад
Chips within chips within chips 🪆
@fulconandroadcone9488
@fulconandroadcone9488 5 месяцев назад
There seems to be some open source hardware development going on, maybe if we get a year of linux desktop one day we get a day of linux cpus.
@nonetrix3066
@nonetrix3066 5 месяцев назад
@@fulconandroadcone9488 Even with open hardware we can't tell if the fab that makes the CPU didn't tamper with it
@Mernom
@Mernom 5 месяцев назад
If the software is FOS, there are plenty enough geeks to find and patch those exploits in due time. If it's not, they will sit there until the for profit programmers who work on things that make them money (AKA not wasting time looking for potential security exploits in the most obscure corners of their source code) to fix it, or for a scandal like this to force their hand. A hardware exploit is meaningless if there is no software path to activate it.
@futuremapper_
@futuremapper_ 5 месяцев назад
@@fulconandroadcone9488it’s almost impossible for a reasonably priced open source cpu to exist based on just how complicated it is
@joeykeilholz925
@joeykeilholz925 5 месяцев назад
Can't get viruses. Just entire vulnerabilities. But they won't let you so much as install an app not authorized by them.
@firewhite
@firewhite 5 месяцев назад
I love how everyone was in a big fuss about side loading apps being a huge risk while shit like this happens every few years. Just like those massive icloud breaches back in the 2010’s
@fulconandroadcone9488
@fulconandroadcone9488 5 месяцев назад
Or remove apps that might be entry points.
@bertcabana5563
@bertcabana5563 5 месяцев назад
Apple is the virus
@0x3v4d3r
@0x3v4d3r 5 месяцев назад
Now I want them to say "oh, its just a conspiracy" again.
@SexKing-hj9nv
@SexKing-hj9nv 5 месяцев назад
dont worry they will, they will keep doing it until our cities are run down with drug users injecting hard drugs on the streets with police refusing to respond while the goverment is openly dismantling even the illusion of democracy. Oh wait...
@derpidius6306
@derpidius6306 5 месяцев назад
oh, its just a conspiracy
@Log4Jake
@Log4Jake 5 месяцев назад
The apple people "we can't get hacked" also pegasus exist.
@no_name4796
@no_name4796 5 месяцев назад
And also apple themselves are the biggest threat to apple users privacy, and i would like to brag ablut using android, but i don't even think google is less bad... Well at least i use linux on my computer
@arthurwintersight7868
@arthurwintersight7868 5 месяцев назад
@@no_name4796 - What we need is a law mandating that all hardware above a certain level of processing capability (IE, anything stronger than a smart phone from ten years ago) has to support an open source operating system - either freeBSD or Linux, where the penalty for a regulator not being able to install Linux or freeBSD on the device, is a full public-domain release of all hardware schematics, and any and all source code related to the device, along with a forfeiture of any copyrights and patents related to said device. We need to stop dancing around the bush on this shit - if it supports Linux then it'll support Windows, Android, and any other operating system in existence as well.
@twenty-fifth420
@twenty-fifth420 5 месяцев назад
@@no_name4796To be very fair, I think mobile devices are easier to compromise then desktops. I think I saw a video about someone claiming the opposite and I sort of laughed at it, but I couldn’t tell ya if that is true or not. Personally, I think it easier because phones are largely ‘simpler’ systems with more attack vectors since they are ‘smart’ devices. The chips are different from desktops, there is more features like the camera or the fingerprint detection that can make a hacker blush. Finally, I think the more closed source nature of the app stores could be used to maliciously distribute bad code easier then just browsing online. I could be wrong, I am definitely not a security expert.
@harriet-x.x
@harriet-x.x 5 месяцев назад
​@@no_name4796depends on what phone and os you use, you can use lineageos and hell even grapheneos if you want!
@JO3BID3N-is-a-P3D0
@JO3BID3N-is-a-P3D0 5 месяцев назад
as someone who doesnt like apple at all, and genuinely really believes that Pegasus and other mythical creatures exist, your comment has me really confused. i am not being sarcastic at all
@IDESTROYER236
@IDESTROYER236 5 месяцев назад
At this point, Apple does not have vulnerabilities. They have full-blown goatses.
@jebediahkerman8245
@jebediahkerman8245 5 месяцев назад
Why did you do this
@sirspoonyr
@sirspoonyr 5 месяцев назад
please take my like and delete this naow
@dankhill_
@dankhill_ 5 месяцев назад
Full blown and goatse should NEVER be together in a sentence….. 🤢
@thewhitefalcon8539
@thewhitefalcon8539 5 месяцев назад
This isn't a full blown goatse. It's actually a very typical escalation chain.
@deadchannel2837
@deadchannel2837 5 месяцев назад
I just like the term goatse
@233kosta
@233kosta 5 месяцев назад
5:08 They call the process "fuzzing". Essentially, throw arbitrary instructions at the chip and see what happens. Some you cab bruteforce like that really quickly. Others can take weeks.
@user-dv6yo5bc4z
@user-dv6yo5bc4z 5 месяцев назад
because ARM is RISC
@lucasthompson1650
@lucasthompson1650 5 месяцев назад
Yup. Fuzzing (and JTAG/test pads) is how a lot of this kinda stuff gets discovered.
@233kosta
@233kosta 5 месяцев назад
@@user-dv6yo5bc4z They do it to x86 too. Easier and quicker on RISC chips though.
@fulconandroadcone9488
@fulconandroadcone9488 5 месяцев назад
@@lucasthompson1650 then the question is, doesn't apple has better access to those same things, and could run it from you know start of development instead of having to buy some some and revers engineer all of the stuff?
@OrioPrisco
@OrioPrisco 5 месяцев назад
yeah i've watched some of christopher domas defcon talks on youtube and this is exactly the sprt of stuff he does, And he is just one guy. An entire corporation can surely do the same sort of stuff
@IridescentKySoul
@IridescentKySoul 5 месяцев назад
Apple users try to not bend over for the company challenge (impossible)
@gwrydd
@gwrydd 5 месяцев назад
Googles not any better lol all big tech companies are a huge privacy concern example being the incognito recently
@MaxwelI
@MaxwelI 5 месяцев назад
Look y’all once your device has Wifi, Bluetooth or any means of connecting with the outside world it’s vulnerable, theoretically if you actually wanted to be completely safe you’d need to download all apps and games that you want, then disconnect the Wifi and Bluetooth chip, plus other components that may have contact with the outside world. No system is 100% safe
@algumnomeaihehe
@algumnomeaihehe 5 месяцев назад
anglophone try not to blame individuals for systemic issues challenge (just read althusser)
@Spiney09
@Spiney09 5 месяцев назад
How is this exclusively an Apple thing? Like yes this particular video is about an Apple exploit that is really dangerous and that’s bad, granted. But if you think there aren’t cyber weapons that are just as dangerous targeted around Windows and Linux you are deluding yourself. The US has already leaked some of the ones targeted around Windows accidentally, we know they have them.
@Nichrysalis
@Nichrysalis 5 месяцев назад
Based on how convoluted the attack chain was obfuscated and yet how easy it is for an attacker, this was definitely intentionally implemented to make the attack method difficult to find and easy to carry out.
@praisephillips9459
@praisephillips9459 5 месяцев назад
"china phone bad because backdoor" America fone:
@myxobe
@myxobe 3 месяца назад
i feel like the reason for canada to ban Xiaomi was not because they cared about their citizens' privacy, but rather to monopolize on profiting from their data themselves
@tbhUSuckOo
@tbhUSuckOo 3 месяца назад
This. China doesnt need to collect data themselves, they already have an immense inhouse userbase. And they can just buy it@@myxobe
@extra-terra-strial-bv9pv
@extra-terra-strial-bv9pv 5 месяцев назад
Sending this to my apple obsessed friend
@user-sy4mp8hq6i
@user-sy4mp8hq6i 5 месяцев назад
Nooooo, he gonna defend Apple anyway😂
@Heynmffc
@Heynmffc 5 месяцев назад
4 new zero day drop 🗣🗣🗣
@AGuywhohasGoodTaste
@AGuywhohasGoodTaste 5 месяцев назад
🔥🔥🥶🥶
@X-MEN21
@X-MEN21 5 месяцев назад
Security has always been a matter of ''are you bored enough to do it? '' as opposed to the fear based ''is it possible? ''
@guilhemedemassenaladario
@guilhemedemassenaladario 5 месяцев назад
Hidden instructions and registers can be found by fuzzing the CPU. This is something that has been done in the past on custom CPUs based on well-known architectures. I think the main question is why these unused features got in the final product, or if is an undesired side effect in the architecture.
@MRL8770
@MRL8770 5 месяцев назад
The reason why might be as simple as to cut the costs that would go into design and verification stages for a new version of the chip with the registers removed.
@ic7481
@ic7481 5 месяцев назад
Fuzzing won't find everything
@rivershen8199
@rivershen8199 5 месяцев назад
Yes, especially when you consider that they could make the exploit dependant on two special instructions in a row. The second won't do anything unless the first one is used directly before and using the first instruction will not produce any visible effect unless the second is used directly after. How you gonna brute force fuzz your way through that? There's exponential possibilities.
@ic7481
@ic7481 5 месяцев назад
@@rivershen8199 plus there could also be built in time depedancies - this adds another level of exponential possibilities.
@MRL8770
@MRL8770 5 месяцев назад
@@ic7481 It can find A LOT. For example AMD's (formerly Xilinx) bitstream formats of their 7-series FPGAs have been reverse-engineered with fuzzing.
@killingtimeitself
@killingtimeitself 5 месяцев назад
you mean to tell me closed source hardware/software is vulnerable? Shocker.
@GrueneVanilleWaffel
@GrueneVanilleWaffel 5 месяцев назад
Fuck But we only have closed source hardware
@lisam5802
@lisam5802 5 месяцев назад
@@GrueneVanilleWaffel you don't run a [obscure piece of technology from 2014 that still uses proprietary parts anyways] big opsec fail...
@killingtimeitself
@killingtimeitself 5 месяцев назад
NOT WITH THAT ATTITUDE WE DONT@@GrueneVanilleWaffel
@GrueneVanilleWaffel
@GrueneVanilleWaffel 5 месяцев назад
@@lisam5802 sorry, I don't get it
@bomlife1572
@bomlife1572 5 месяцев назад
using open source and foss is seen as socialism for some people
@Underqualified_Gunman
@Underqualified_Gunman 5 месяцев назад
I remember hearing about some folks getting stalked with a similar exploit.
@zekiz774
@zekiz774 5 месяцев назад
It was with this exact one
@mskiptr
@mskiptr 5 месяцев назад
Going by the analysis of Marcan (the MacBook Linux guy), it seems like this vulnerability could have plausibly been found by just guessing. The memory addresses it uses lie right next to the GPU control area, so by poking here and there you could have found it does _something._ Still, the number of (0-day) exploits used here and the sophistication of the entire deployment chain is mind-boggling and comparable only to the likes of Stuxnet! Definitely from a state-sponsored hacking group.
@silverdragonslair
@silverdragonslair 5 месяцев назад
And he also thinks they're hardware design debug registers, not an intended backdoor, per se.
@ra2enjoyer708
@ra2enjoyer708 5 месяцев назад
@@silverdragonslair The best part these things are not exclusive.
@magicmanchloe
@magicmanchloe 5 месяцев назад
5:50 I work in 3rd party repair fixing iPhones for a living. I once accidentally triggered the iPhone the blue screen (yes blue screen on iOS) with a strange code on the display. Apple support didn’t know what it was and google had no info. I accidentally triggered it by connecting a faulty screen with the pins for the display connection misaligned. My best guess is it was some sort of internal debugging or diagnostic mode. So I’m not saying that you’re wrong I’m just saying it’s possible to Find these “back doors” in other ways.
@Lupinicus1664
@Lupinicus1664 5 месяцев назад
This kind of thing, where the hardware itself is 'untrustworthy', has been a suspicion for years. I have some older IBM laptops which I use for a password database, that is never connected online, but also because it is one of the last laptops where the chipsets are 'known' to be what you think they are. Without any possible additional 'features'. Excellent video as always.
@fulconandroadcone9488
@fulconandroadcone9488 5 месяцев назад
I wonder how long until fully open source chip designs hit the market, I have seen some RISC V but at very low powers, maybe in a few years it will only be a question can we trust the foundry to build actual designs,
@contactjd
@contactjd 5 месяцев назад
What era/chipset is that out of interest?
@phgamer4393
@phgamer4393 4 месяца назад
@@contactjd i mean there is no proof even back then that they arent backdoored. I think in the K& R C boiok there is even a topic about rogue compilers. like the problem goes way back to the 70s/80s.
@LaskyLabs
@LaskyLabs 5 месяцев назад
Shame it was abused by the glowies instead of given to the people for a jailbreak instead.
@thewonderingape6383
@thewonderingape6383 5 месяцев назад
fr an ios 15.7 jailbreak on non checkm8 devices would be amazing
@Enderspearl184
@Enderspearl184 5 месяцев назад
@@thewonderingape6383aka you currently have that setup right i may or may not be hoping for something similar though lol
@wilh3lmmusic
@wilh3lmmusic 5 месяцев назад
@@thewonderingape6383it’s coming
@talon12020
@talon12020 5 месяцев назад
They attacked Kaspersky devs? Oh yeah this glows brightly.
@imgladnotu9527
@imgladnotu9527 5 месяцев назад
that was a while back and he also covered the news
@evilleader1991
@evilleader1991 5 месяцев назад
That was how they got caught, they attacked researchers @ Kaspersky and they managed to uncover the whole thing.
@Rayyan-hi2ge
@Rayyan-hi2ge 5 месяцев назад
Too bad the gloweys have way more vulnerabilities.
@bckends_
@bckends_ 5 месяцев назад
Bro please inform people that simple mobile tools got sold to some sketchy corpo
@not-underscore
@not-underscore 5 месяцев назад
​@@kevinm45684to zipoapps, known to buy projects and then put ads and subscriptions on them So, it was good while it lasted 🫡
@tflsh
@tflsh 5 месяцев назад
​@@kevinm45684zippoapps
@harriet-x.x
@harriet-x.x 5 месяцев назад
​@@kevinm45684some random chinese company that makes ad bloated apps :< But!! If you do NOT update you are fine!
@imgladnotu9527
@imgladnotu9527 5 месяцев назад
​@@kevinm45684zippoapps
@jordanrodrigues1279
@jordanrodrigues1279 5 месяцев назад
​@@kevinm45684 the same Israeli firm that everyone sells out to and is definitely only in the business of ads and crapware
@JohnDlugosz
@JohnDlugosz 5 месяцев назад
5:45 How could anyone figure out how to use this undocumented feature? There was an interesting presentation, on the Intel-AMD64 architecture, at one of the major programming conferences a couple years ago. 1) the presenter wrote very clever code to find undocumented instructions. This included executing bytes at the very end of a memory page to see if the instruction was "taken" before it fetched bytes from beyond the page. When discovering a new instruction, he would thus determine how many bytes it needed. 2) read patent applications. If they describe some feature of the SoC, maybe they're _doing_ something like that on some existing product now. I'm sure the same principles apply to this platform.
@Rightly_Divided
@Rightly_Divided 5 месяцев назад
Brilliant observation!
@Iceman259
@Iceman259 5 месяцев назад
State level actors can also simply crack open an iPhone and run it under an SEM. Hell, @BreakingTaps does this as an individual. Not a long shot to find secret registers that way.
@afinelad3673
@afinelad3673 5 месяцев назад
What's an SEM?
@ldt8904
@ldt8904 5 месяцев назад
@@afinelad3673scanning electron microscope
@rivershen8199
@rivershen8199 5 месяцев назад
Scanning electron microscope. They can detect much finer detail than light can.
@Arek_R.
@Arek_R. 5 месяцев назад
When you design your own silicon it's almost impossible to accidentally add extra stuff. It's a massive investment especially in this case, and everything gets checked thousands of times by hundreds of experts.
@theofficialjeff
@theofficialjeff 5 месяцев назад
You say expert, I say coworker desperately trying to close the Jira ticket from hell to get his manager off his back.
@Arek_R.
@Arek_R. 5 месяцев назад
@@theofficialjeff Isn't Jira for software development
@theofficialjeff
@theofficialjeff 5 месяцев назад
@@Arek_R. project management in general ¯\_(ツ)_/¯
@ihadmyfill
@ihadmyfill 5 месяцев назад
defo a glowie backdoor
@myREALnameISiAM
@myREALnameISiAM 5 месяцев назад
'Backdoors' are in the original charter of the F.B.I. It started with phones and service providers being required to design the phone network so it can be spied on.
@orangejjay
@orangejjay 5 месяцев назад
You do realize that the "original" FBI charter was written only 40 or so years ago, well after the FBI had been in existence, yes? And no, that original charter makes no mention of requiring phone providers to design a network that can be spied on. The nature of analog and digital are such that they can be spied on. No one forced anyone to make them that way. Anyone who understands even the basics of how wires and circuits work can see that. It's not particularly complicated. 😂
@waltergabriel5501
@waltergabriel5501 5 месяцев назад
In my opinion, this is clearly a backdoor planted by the manufacturer
@camsand6109
@camsand6109 5 месяцев назад
I figured this had something to do with Pegasus. Crazy it took them this long to patch it.
@jittertn
@jittertn 5 месяцев назад
One of the exploits used is from the 90's 😂
@EnFuego79
@EnFuego79 5 месяцев назад
"Patch"...🤨
@ThisAintIt435
@ThisAintIt435 5 месяцев назад
Hope everything is well with you. Cheers my friend.
@SlainByTheWire
@SlainByTheWire 5 месяцев назад
Death knocking on door meme. Intel door: 👽 dead AMD door: 👽 dead ARM door: knock knock 👽
@poisonouspotato1
@poisonouspotato1 5 месяцев назад
Bogos binted energy 👽
@USB3.2
@USB3.2 5 месяцев назад
Well, time for PowerPC to come back
@find2hard
@find2hard 5 месяцев назад
RISC-V pls save us!
@alwaysradical
@alwaysradical 4 месяца назад
Rotten 🥧
@deleleledrios2018
@deleleledrios2018 5 месяцев назад
Thats why i use GrapheneOS on my Google Pixel and you should too
@kevinmiller5467
@kevinmiller5467 5 месяцев назад
Do you think Google doesn't include hardware backdoors in their pixel phones?
@salpertia
@salpertia 5 месяцев назад
Nice bet *unless there's a zero day for grapheme we don't know about despite all that open source*
@guestimator121
@guestimator121 5 месяцев назад
@@kevinm45684 Hello, mr Glowwie 45684
@ScarfaceLittlebee-mj2ch
@ScarfaceLittlebee-mj2ch 5 месяцев назад
I use a modified Android
@dan00b8
@dan00b8 5 месяцев назад
@@kevinmiller5467 Still a better bet than the combo of backdoored OS+hardware. Even if the hardware itself is compromised, you have to find an (unintentional) 0 day exploit that escalates you from nothing to hardware level in order to exploit that backdoor anyway. And the grapheneos team has shown that they really dont play around and actively assume through each line they write that "if this piece of code were to be exploited, would the danger at least be contained?" Also it is very difficult nowadays to find hardware that is (provably) not backdoored, or check the integrity of the claimed implementation, which is why even if they open sourced their titan m firmware you still would not be completely sure. This is why bothering with such details goes beyond tinfoil hat territory. I mean if someone else with backdoor access gets a physical hold of your phone you would be screwed but if your threat model is that large and you got in that situation you screwed up somewhere else entirely anyway...
@Xhadp
@Xhadp 5 месяцев назад
Anyone remember the time when an organization had to get involved for a iphone where the really badly wanted to get the contents but one last failed password attempt wiped the iphone's contents? I wonder if anything related to this backdoor could be connected back to that whole thing that ended up being a huge non-story at the end of the day.
@navibongo9354
@navibongo9354 4 месяца назад
Exploit aside, your presentation was perfectly on the spot. No rambling, no bs, just spot on fax & technical breakdowns. 👍
@FeedMeSalt
@FeedMeSalt 5 месяцев назад
So basically ACE from fucking Zelda speed running but even worse. Amazing. Being able to mess with memory is unbelievable.
@stanleykeal2452
@stanleykeal2452 5 месяцев назад
I wouldn’t be surprised if they put Pegasus on the phones before they come out at this point.
@drumitar
@drumitar 5 месяцев назад
imagine using apple products at this point.
@Not_Airrack
@Not_Airrack 5 месяцев назад
Do you really think android is safer?
@MrSolidsnake293
@MrSolidsnake293 5 месяцев назад
@@Not_Airrack at this point anything is better than apple, and the best choice of all is to get off grid, cant hack what isn't digital. when real life comes knocking these hackers wont be safe. Real Life catches up to everyone
@firewhite
@firewhite 5 месяцев назад
It’s honestly mostly about the convenience of a simple device. I still have an android for work and more heavy duty stuff but an iphone is an easier daily driver for simple tasks.
@MrSolidsnake293
@MrSolidsnake293 5 месяцев назад
@@firewhite Apple is not more convenient its OS is built so that normies cant do anything with it other than what apple allows....these people must like being in a playpen while everyone else goes outside to the real playground. saying apple is an "easier daily driver for simple tasks" is like saying a children's learning computer from playschool is the best choice for people who need an "easier daily driver for simple tasks" the problem is people refuse to adapt to technology and the companies are taking advantage of said ignorant customer who refused to move away from a locked system that they don't even truly own, therefore allowing the industry to corner people into thinking that a closed system is better than an open one it happened to restaurants, it happened to cars, and now its happening to basic computer and phone....
@harriet-x.x
@harriet-x.x 5 месяцев назад
​@@Not_Airracklaughs in graphene os yes mate it is :P
@Yaheeeeee
@Yaheeeeee 5 месяцев назад
Very interesting and certainly quite the take on this situation.
@WarkWarbly
@WarkWarbly 5 месяцев назад
Its not uncommon to have redundancy in hardware. We know the process primarily as "binning" but, redundant features and surfaces are built in and either deactivated (fused off) or just not utilized. They're part of the fabrication process, as everything is incredibly tiny, most features (such as a group of transistors) are replicated a few times over, then wired into a given surface (such as an adder within the ALU). They're then wired together, tested, and whichever feature group performs according to spec (in this case the spec is based on Apple's wants) is chosen. The unused features can be fused, or go unutilized, or even be programmed to kick in if the other features fail (though this is typically only done in memory ic). But I will say this attack chain is a bit sus...
@truelies5431
@truelies5431 5 месяцев назад
Tim Apple 🤣
@cobblerthebold
@cobblerthebold 5 месяцев назад
Thank you for all your videos, of all genres. They’re always appreciated and at least somewhat entertaining. But someone referring to you as Vegan Gains is just about the funniest thing I’ve seen related to your context.
@ekkekristo
@ekkekristo 5 месяцев назад
lmao 🤣🤣🤣
@experiment54
@experiment54 5 месяцев назад
Bro is a doppelgänger
@janik4546
@janik4546 5 месяцев назад
What a timing. Just saw their C3-talk about them being targeted by this vulnerability. Might want to check it out aswell.
@zitoschouten5068
@zitoschouten5068 4 месяца назад
Loving the flolding table setup in the back
@MushookieMan
@MushookieMan 5 месяцев назад
Closed source, absolutely proprietary
@journey8533
@journey8533 5 месяцев назад
The only reason to keep code closed source is because you have something to hide. Either its embarrassingly bad, or its malicious. Today, like every day you see closed source products, you have to ask yourself. Was this incompetence or malice? In this case it took so many lucky coincidences and lucky hardware quirks, i think it was malicious.
@MrSolidsnake293
@MrSolidsnake293 5 месяцев назад
its always malice, no company in the modern era hides info because of embarrassment to them embarrassments are just good coverage until the majority of people "forget" after 24hours.....these new age people might as well have the memory of a goldfish, if you don't maintain training fish just default back to base needs, like the fools who run a good country into the ground for "the greater good"
@GoogleDoesEvil
@GoogleDoesEvil 5 месяцев назад
Or archaic licensing deals from 30+ years ago that are still in effect.
@cat-.-
@cat-.- 5 месяцев назад
Or u don’t want an open source version to float around?
@ghost-user559
@ghost-user559 5 месяцев назад
Lol so I can have anything in your bank account and retirement accounts right? You don’t have anything to hide and you don’t believe in private property rights, so why not send your life savings to me?
@JPS13Laptop
@JPS13Laptop 5 месяцев назад
@@cat-.- This
@Linkman8912
@Linkman8912 2 месяца назад
"Spectre and Meltdown, which were like 5 years ago." Yeah I feel old now.
@ld2048
@ld2048 5 месяцев назад
the NSA forces US semiconductor manufacturers to leave physical backdoors in the architecture itself, TSMC doesnt escape it either
@pro_154
@pro_154 5 месяцев назад
I've been suspecting this for years, suprised to hear pseudo confirmation
@GazMatic
@GazMatic 5 месяцев назад
7:25 As someone who was in Russia, saying “avoid American products” is very difficult because the Russian versions were so underwhelming. Matter of fact, Putin has been trying to push Russians to use their version for years. Guess what though. Because of the Russian war, a large adoption of Russian products arose. Although it’s still not the majority because these products are still mediocre.
@alexturnbackthearmy1907
@alexturnbackthearmy1907 5 месяцев назад
And in 90% of cases are re-brands made in china from used/bad binned chips. No wonders here, even if they have a tech, there is no way to make modern things, there are no factories capable of making them (even something of 2010`s level of architecture).
@FIAaPn
@FIAaPn 5 месяцев назад
I'm not sure about the government jobs, but pretty much everyone here uses WhatsApp, no matter the age. Younger folk (especially females) uses Instagram (via VPN) - both belong to Meta.
@duplicake4054
@duplicake4054 5 месяцев назад
I already knew about this about a month ago because Kaspersky sent me a message saying 'update all your ios devices' and linked to the securelist article (securelist is owned by Kaspersky for clarity)
@Zay.FL.
@Zay.FL. 5 месяцев назад
i used to work at t-mobile around 2020 during lockdown, and a customer brought their iphone in saying somebody was listening and watching everything he does. They basically had 24/7 screenshare and can access root files.
@vladislavkaras491
@vladislavkaras491 5 месяцев назад
Thanks for the news!
@JhnyBravos
@JhnyBravos 5 месяцев назад
Thank you Jason Tatum for this information
@Iceman259
@Iceman259 5 месяцев назад
I hate the Celtics but I love FOSS
@Ratzfourtyfour
@Ratzfourtyfour 5 месяцев назад
iPhone mishaps make me lol. Pay 1 grand to have the glowies in your phone.
@slartibartfast7921
@slartibartfast7921 5 месяцев назад
Great info, thanks!
@ihateevilbill
@ihateevilbill 5 месяцев назад
You're probably right about the three letter agency being the ones that pressured for this, however, theres another possible explanation. A couple of years ago I watched a TED talk about searching for undocumented op codes and functions in hardware (by requesting every possible op code hex address and seeing if it did something, then figuring out what that something was). This kind of brute force attack on the hardware would make stuff like backdoors "visible". So, Id imagine the back door was (as you said) for technicians and wasnt removed in the final design, but the op codes could be found without internal knowledge of the hardware.
@losttownstreet3409
@losttownstreet3409 5 месяцев назад
If you develop a CPU you need to implement some basic "backdoor": you need to scan the CPU for errors in the production plant. Usually there should be fuses to permanently deactivate these debug functions. Some plants used to cut the part of the chip: but it is expensive to cut some silicon off after the final validation. You see many SOC's where the fuses aren't set because somebody forgot at the production phase and the pushed the last known good working development phase out through the door. It's often timelines where some undocumented function or firmware read/write fuses got forgotten, or every device uses the same master key. You need to sell some iPhones with the debug function enabled to development studios.
@nickplays2022
@nickplays2022 5 месяцев назад
What kind of development studios need debug function enabled?
@contactjd
@contactjd 5 месяцев назад
Reminds me of the AMD Athlon cpu, you could increase the clock speed with a small line of pencil between two points
@TechSavy-je4tp
@TechSavy-je4tp 5 месяцев назад
Development studios, what? This isn't a console or something similar, there's no such a thing as an iPhone devkit. It's just the combo xcode and whatever runs ios.
@andrewphi4958
@andrewphi4958 5 месяцев назад
Dude, you DON'T just "forget" at multi-BILLION ultra-high-tech production where every step is approved, monitored, checked and re-checked multiple times by different people and machines.
@hank_lg
@hank_lg 5 месяцев назад
May I remind the Intel management engine? Which is a part of every Intel processor. It is suspected to be a hardwired backdoor. Same with AMD CPU's.
@vanish3408
@vanish3408 5 месяцев назад
Your glowie thumbnails are always on point!
@mattl6459
@mattl6459 5 месяцев назад
Great video. Commenting to boost visibility.
@NapanTR
@NapanTR 5 месяцев назад
Just the other day there were news saying Apple phones were very secure.. Wondering if this whole thing will hit mainstream news too
@fulconandroadcone9488
@fulconandroadcone9488 5 месяцев назад
When they get messages with links to blogs describing it they will most likely self destruct on arrival without trace.
@accountname7738
@accountname7738 5 месяцев назад
I'm still not upgrading! I've been waiting years on IOS 16.0 for a jailbreak. Let's hope this exploit can be used to jailbreak my phone and then we can patch it ourselves. :)
@ayanned
@ayanned 5 месяцев назад
Loved your video thumbnails. That glow Nigerian got caught.
@smugwolff6828
@smugwolff6828 5 месяцев назад
Oh I’ve exploited undocumented registers for some stuff on 70s hardware before (to give myself afew extra bytes of ram by having my kernel access the ones that didn’t interfere with anything like they were regular bytes of ram, 32 byes of ram is pain) I don’t know the specifics of what’s going on here with Apple but it’s not as uncommon as you would think for there to be unused or undocumented registers in a cpu I guess I’ll spend next week locating them on the silicon to see if I would be able to physically disable them like I did to the neural engine
@FoxGrayMusic
@FoxGrayMusic 5 месяцев назад
Okay so some things to know, it is actually able to find on a device. I had a friend go to federal prison recently and my phone started acting up, I got a voicemessage with this payload ingrained. I actually still have the payload on my computer in a vm for testing. It was an interesting ass process to find, but even more interesting that just based off a friend going to jail a governmental body felt it opened the right to infect close people. I was on IOS 15.6.1 SO UPDATE UPDATE UPDATE!
@andrewphi4958
@andrewphi4958 5 месяцев назад
Use it for root ) Seriosly, though, it's scary. I'd get rid of any apple shit long ago.
@texrayvision
@texrayvision 5 месяцев назад
I've been doing what I've been doing long enough to believe that the NSA has almost certainly approached vendors to do this exact thing. The problem with making a backdoor for the three & four letter boys, is that it does so for everyone else. Give it enough time and it will be their backdoor too.
@Zemtex22
@Zemtex22 5 месяцев назад
So McAfee was right? Who would have thought.
@johnnylego807
@johnnylego807 5 месяцев назад
Absolutely wild, but not surprised, knew about this for a LONG TIME because many police depts were and are using a similar back door to gain root too users phones, by 3rd party companies that sell the devices too them,(for the right price of course)
@TrickyNekro
@TrickyNekro 5 месяцев назад
I´d say, the ONLY benign explanation is silicon reverse engineering parts that were meant for debugging. That being said... I´m not naive either...
@mskiptr
@mskiptr 5 месяцев назад
poking memory at random goes brrrrrrrrr
@Randomynous01
@Randomynous01 5 месяцев назад
So basically if the cpu manufacturers have properly designed their products to be secure, none of this could have happened? It appears that the problem lies in the very root of the tech system.
@GreasinFromHNG
@GreasinFromHNG 5 месяцев назад
your not allowed to produce systems impervious to the nsa if you do they will literally kill you
@smollillith4799
@smollillith4799 5 месяцев назад
That thumbnail is a work of art for this situation
@goldmantracks
@goldmantracks 5 месяцев назад
please do an update soon that for 2 days tor exit nodes have been going to Virginia for >48 hours according to several persons
@brandonn.1275
@brandonn.1275 5 месяцев назад
The only backdoor needed is the software update system on iOS. All apple has to do push a single malicious update to all devices to gain access to them and none of us would know about it.
@JPS13Laptop
@JPS13Laptop 5 месяцев назад
Apple wouldn't be able to hide something like that for long.
@brandonn.1275
@brandonn.1275 5 месяцев назад
@@JPS13Laptop if they're gonna do something like brick their devices, yeah that would be painfully obvious but something like taking screenshots and recording keyboard input, that's something that a user wouldn't be able to to identify much less detect using a network packet sniffer when that data is discretely sent back using encryption. It's even something that apple can write off as quality assurance telemetry used for improving the iOS ecosystem and users would have 0 evidence to prove the contrary since they wouldn't be able to read the data being sent back. Keyboard inputs are already sent back for text prediction, the photos you take that automatically get uploaded to iCloud are reviewed by apple for regulatory compliance, your text messages are processed through Apple servers. Breaking end to end encryption is straightforward for apple and only requires a couple changes of code to grant themselves access and no one else. No one would even notice since the imessage's source code isn't visible to the public.
@JPS13Laptop
@JPS13Laptop 5 месяцев назад
@@brandonn.1275 There is always a way to read the data coming out of a device. Even the encrypted stuff.
@georgek4416
@georgek4416 5 месяцев назад
"But we didn't do it on purpose! It was just a vulnerability, we took immediate steps to resolve the issue blah blah"
@fulconandroadcone9488
@fulconandroadcone9488 5 месяцев назад
@@georgek4416 and it can last only of an update cycle, at which point the switch it out and by the time someone figures it was a breach it will be "patched" for a very long time
@piotralex5
@piotralex5 5 месяцев назад
I worked for small companies, I worked for large companies in software dev. The amount of carelessness, mess, lack of security, self-awareness is so through the roof that it doesn't take CIA || FSB || NSO || ISIS agent to implement a backdoor by kidnapping the CEO's family. You just wait for the laziness of devs or send your own dev to do the thing. Or just log in to their MySQL with root root and put some git and cat commands.
@xr.spedtech
@xr.spedtech 5 месяцев назад
Yes ... It's the same reason for solar winds
@JohnSmith-qt4pv
@JohnSmith-qt4pv 4 месяца назад
These are fully functional registers, this isn't an accidental design flaw like some examples FPU or branch prediction errors that can be used for exploits.
@DJ29Joesph
@DJ29Joesph 5 месяцев назад
This was a good video. Thanks.
@c3rb3ru5d3d53c
@c3rb3ru5d3d53c 5 месяцев назад
It is possible to fuzz CPUs for additional instructions or undocumented features. This has been done already for certain subsets of x86 CPUs for exploits. As a result, it is also possible Apple was not acting with malice.
@GreasinFromHNG
@GreasinFromHNG 5 месяцев назад
wrong apple not acting with malice is literally against the laws of physics its not physically possible for anything apple does to not be malicious its malicious by default BECAUSE its apple
@galencole2108
@galencole2108 5 месяцев назад
If Kaspersky is reporting on this it was the one for the Russian iPhone users at the start of the war, and now they started to use Chinese phones. This comes after the Push Notification server thing for all phones, the US Government and associates is grubbing on these.
@thanosbirb2287
@thanosbirb2287 5 месяцев назад
Having an iphone is already a privacy concern 😂
@Haunting_Shadow
@Haunting_Shadow 5 месяцев назад
Having a smart phone in general, is a privacy concern. If you think android is safe, you’re fooling yourself. If you think I’m saying this just to defend apple, you’re a wrong. I see the pros and cons of both devices.
@thanosbirb2287
@thanosbirb2287 5 месяцев назад
@@Haunting_Shadow Google is similar i know
@Lonaticus
@Lonaticus 5 месяцев назад
Ohh!! Is it time?! For The Fappening 2: Backdoor Boogaloo?
@Medivh4-pc6ly
@Medivh4-pc6ly 5 месяцев назад
I was in Kaspersky's talk about the exploit at 37c3. Good job. But you failed to mention that the hack also used a kernel exploit written in JS 😂.
@pi4313
@pi4313 5 месяцев назад
NOO THEY FOUND MY BACKDOOR!!
@sush7117
@sush7117 5 месяцев назад
Russia is actually already moving all sensitive stuff on linux(Astra and Rosa OS). And very sensitive stuff on servers with russian CPUs
@lmnk
@lmnk 5 месяцев назад
Unironically one of the only good thing about the invasion is the amount of boost software import substitution programmes got. I know even some school computers use Alt instead of Windows now
@fulconandroadcone9488
@fulconandroadcone9488 5 месяцев назад
@@lmnk and might lead to a strong software community which in turn might be more capable of exploiting flaws in modern hardware whilst patching there own,
@jarredallen
@jarredallen 5 месяцев назад
unused register isn't that unsual but what is unusual is somebody left a jtag port left open for a remote configuration and debugging a stack overflow. like, siemen, allen bradley, schneinder and ABB dont let thier automation have a particular jtag port open for glow bois to exploit.
@LinkageAX
@LinkageAX 5 месяцев назад
If you're hitting a CPU, wouldn't it be easy enough to see which hashes data is going through? If you keep seeing the same hash come back while processing, it could be something exploitable right?
Далее
Incredible Wheel Restoration Process 🚙
01:00
Просмотров 1,3 млн
5 Mods Nintendo wishes were Illegal
12:47
Просмотров 480 тыс.
A Dark Web Admin's Open Letter To Law Enforcement
19:14
Hackers Abuse Zero-Day Exploit for CrushFTP
31:49
Просмотров 67 тыс.
Russia Just Created Its Own Certificate Authority.
18:16
The Safest Mobile Device: iOS vs Android
10:51
Просмотров 134 тыс.
The Absolute State of College
15:32
Просмотров 199 тыс.
How Hacker PomPomPurin Got Caught (Bad OPSEC)
15:44
Просмотров 366 тыс.
3 Levels of WiFi Hacking
22:12
Просмотров 1,6 млн
WWDC 2024 - June 10 | Apple
1:43:37
Просмотров 10 млн