In response to
"that part I don't understand - what roll does the Pi play in the hack? -- (edited)"
by
decline
|
From what I gather, the Pi is using a pair of off the shelf WiFi adapters to construct malformed packets to Apple devices to exploit a bug in the iOS
|
kernel driver for that feature (airdrop, etc) which ultimately gave him enough access to turn that exploit into the ability to send binary code to the iOS device which it then executed in userspace giving full system access
|
Responses:
|