(评论)
(comments)

原始链接: https://news.ycombinator.com/item?id=38784073

(大多数)评论移至: 三角测量行动:最后的(硬件)谜团 - https://news.ycombinator.com/item?id=38783112 - 2023 年 12 月(71 条评论) 感谢 Ars Technica 的 Dan Goodin 撰写的这篇文章。 这篇文章以“渐进披露”的方式阅读,即使我不是程序员,我也能坚持到底。 丹太棒了。 过去接受过他的采访,他对理解技术细微差别以及向非专业观众准确传达故事的兴趣给他留下了深刻的印象。 他绝对不像我在科技新闻界遇到的很多人那样是一个追逐头条新闻的人。 Ars很幸运能拥有他。 I would like also to link an article with technical details of main exploit (memory protection bypass by using undocumented hadware GPU registers): https://securelist.com/operation-triangulation-the-last-hard... 有一系列关于三角测量操作的文章...... https://securelist.com/trng-2023/

相关文章

原文
Hacker News new | past | comments | ask | show | jobs | submit login
4-year campaign backdoored iPhones using advanced exploit (arstechnica.com)
403 points by airstrike 15 hours ago | hide | past | favorite | 5 comments










(Most) comments moved to:

Operation Triangulation: The last (hardware) mystery - https://news.ycombinator.com/item?id=38783112 - Dec 2023 (71 comments)



Major kudos to Dan Goodin at Ars Technica for this write up. The article reads in a “progressive disclosure” manner, and I was able to follow along to the end even though I am not a programmer.


Dan's fantastic. Been interviewed by him in the past and was super impressed by his interest in understanding technical nuance and communicating the story accurately to a lay audience. He's definitely not a headline chaser like a lot of folks I've met in tech journalism. Ars is lucky to have him.


I would like also to link an article with technical details of main exploit (memory protection bypass by using undocumented hadware GPU registers): https://securelist.com/operation-triangulation-the-last-hard...


There is a series of articles on Operation Triangulation...

https://securelist.com/trng-2023/







Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact



Search:
联系我们 contact @ memedata.com