▲ | strcat 3 days ago | |||||||||||||||||||||||||||||||
Neither Apple or Google truly knows how widespread attacks on their products have been despite portraying it as if they have perfect insight into it. They're claiming to know something they cannot. GrapheneOS has published leaked data from exploit developers showing they're much more successful at exploiting devices and keeping up with updates than most people believe. We have access to more than what we've published, since we don't publish it without multiple independent sources to avoid leaks being identified. These tools are widely available, and it cannot be generally known when they're used whether it's data extraction or remote exploitation. Catching exploits in the wild is the exception to the rule, otherwise exploit development companies would have a much harder job needing to keep making new exploits after they're heavily used. They wouldn't value a single exploit chain nearly as much as they do if it stopped working after it was used 50k times. Law enforcement around the world has access to tools like Cellebrite Premium which are used against many people crossing borders, at protests, etc. That is usage at scale. There's far less insight into remote exploits which don't have to be distributed broadly to be broadly used. | ||||||||||||||||||||||||||||||||
▲ | saagarjha 3 days ago | parent | next [-] | |||||||||||||||||||||||||||||||
Apple and Google have access to similar or more information than you do, they just don't publish it for similar reasons. | ||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||
▲ | bigiain 3 days ago | parent | prev [-] | |||||||||||||||||||||||||||||||
> tools like Cellebrite Premium which are used against many people crossing borders I wonder when the first person will be turned away from a US border for having an iPhone Air that the CBPs phone extraction tool doesn't work on? |