8 posts • joined 12 Mar 2010
The anonymous replies seem to miss the point. Other platforms have had a spate of bugs which allow anyone to pick up a handset and bypass the lock screen, giving them somewhere between "full" and "pretty substantial" access to the device with no prior access or action required.
This flaw requires an attacker to persuade a user to install software and then, later, physically access the device and take advantage of the lock-screen bypass software they've installed. Doesn't seem in quite the same class to me?? As others have said, if you're in a position to be able to persuade the target to install software you could just persuade them to install software to access the data / feature you're interested in and forget about having to physically retrieve the handset later.
I'm not sure it counts as Raymond's airtight hatchway because it sounds like a local privilege escalation.
Re: Allow me to reciprocate
All done here, with the exception of Exchange, which is still the only software I can find with decent calendaring and push support. Looking forward to your views.
Layer 4 connections per-second-per-Watt = Layer 4 connections per Joule.
"1,046 requests per second per watt"
"1,046 requests per Joule"?
The title is required, and must contain letters and/or digits.
"Thompson is right to prostate himself in front of his customers"
Care to proof-read that??
"... Opteron was delayed for six months because of an error in a table lookaside buffer (TLB) on the chips..."
Thanks for trying to explain the TLA, but it's actually a transaction lookaside buffer.
But you don't need to read all of it.
That would be a million in any language.
- The land of Milk and Sammy: Free music app touted by Samsung
- The long war on 'DRAM price fixing' is over: Claim YOUR spoils now (It's worth a few beers)
- Privacy warriors lob sueball at Facebook buyout of WhatsApp
- 20 Freescale staff on vanished Malaysia Airlines flight MH370
- Dell thuds down low-cost lap workstation for
cheapfrugal creatives or engineers