pull down to refresh
453 sats \ 1 reply \ @xz 30 Dec 2023 \ on: 37C3 - Operation Triangulation: What You Get When Attack iPhones of Researchers security
They explained the mechanics very well. Interesting to hear that machine learning was employed in the scraping and theft of user images. My guess is that tuning models on user biometry and text dbs was the purpose.
Pure speculation though!
Thanks for the review, now I might watch it myself, lol
reply