pull down to refresh

100 sats \ 0 replies \ @Scoresby 3h
When an infected image arrived, the background image renderer extracted and executed the hidden payload without user interaction. Once inside the device, the malware modified SELinux policies, granting itself extended privileges to access private data and bypass sandboxing. Landfall's operators could pull extensive information from the phones, including device identifiers, installed applications, contacts, file directories, and browser data. The spyware could even activate microphones and cameras remotely.
I'm surprised this doesn't happen more frequently.
Or maybe I mean that I'm surprised we don't hear about this happening more frequently.
It seems like image/video would be such a great way to deliver malicious code. Images are everywhere, people blindly load them in browsers, and nobody really thinks about it.
reply
121 sats \ 2 replies \ @88b0c423eb 3h
I have used graphene, calyx and lineage in the past, very happy with iodé now. And iodéOS supports many devices, i like the idea of buying a used phone and running lineage or iodé: https://iode.tech/ BTW iodé sells phones with the OS already installed for the less technical and lazy volks, and considering that calyx is paused I think it's the best, cheapest alternative out there.
reply
Yes is good to have a simple OS for older devices too. Not everybody can afford a Pixel.
reply
a pixel means less sats, espcially in poor countries where they cost much more than USA and europe, btw is there some case where lineage, calyx iodé got compromised and grapehne did not? I hear a lot that graphene is the most secure one, but irl never heard of some degoogled hacked. Then of course i'm not talking about 3letter agencies and etc...
reply