Why Nostr? What is Njump?
2024-08-15 17:50:30

learningcode on Nostr: Source is twitter from account GrapheneOS: Wired was manipulated into spreading ...

Source is twitter from account GrapheneOS:

Wired was manipulated into spreading misinformation to market Palantir and iVerify by misrepresenting a vulnerability in a disabled demo app as being a serious problem which could be exploited in the real world. They should retract the article but won't.
https://www.wired.com/story/google-android-pixel-showcase-vulnerability/

"iVerify vice president of research [...] points out that while Showcase represents a concerning exposure for Pixel devices, it is turned off by default. This means that an attacker would first need to turn the application on in a target's device before being able to exploit it."

"The most straightforward way to do this would involve having physical access to a victim's phone as well as their system password or another exploitable vulnerability that would allow them to make changes to settings. Google's Fernandez emphasized this limiting factor as well."
Author Public Key
npub15ptts88krr856gmyjwjszudmcfmnujgeslyg836q3ltsrn60jl5q94grv6