Dan Goodin on Nostr: [@kimzetter]()'s coverage of the GoFetch side channel is easier to understand than ...
Published at
2024-03-23 20:12:35Event JSON
{
"id": "56f68376878fad43e79f88997297a88d6bb7de54ab1b0b03e43b195697cea1c9",
"pubkey": "147ee4e6ce3be559a048d5891b414f5187ae3a6dac96b30a0dae7982fe94cf18",
"created_at": 1711224755,
"kind": 1,
"tags": [
[
"p",
"41b6f547c3add1254a545c09e08ece6e782544e54b506be49fd38340dc8bfecd"
],
[
"proxy",
"https://infosec.exchange/users/dangoodin/statuses/112146825547829322",
"activitypub"
],
[
"L",
"pink.momostr"
],
[
"l",
"pink.momostr.activitypub:https://infosec.exchange/users/dangoodin/statuses/112146825547829322",
"pink.momostr"
]
],
"content": "[@kimzetter](https://infosec.exchange/@kimzetter)'s coverage of the GoFetch side channel is easier to understand than the article I did. It also digs into practical considerations of the vulnerability. Well worth the read.\n\nhttps://www.zetter-zeroday.com/apple-chips/",
"sig": "d20b329700a82757b50e8a35a2e7cac155240e4a97c51b2c3b97491dbad3a5f34239edbef63f0cf56c9236dd8e50ba2847f9d446ec78daa2fe9be9658c840eea"
}