Hacker News new | past | comments | ask | show | jobs | submit login

I'm sure there are, remember the bezos hack? Wasnt it a video from snapchat on iphone or something? But mostly the ones coming from Apple seem to be physical access only. You can assume, as with any personal computing device, once it's in someone else's hands, your data is as good as theirs.

Some make it more difficult than others. But 400 remote access vulnerabilities is a completely different ball game.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: