Reply to post: Re: Mitigation

Got an Android phone? SMASH IT with a hammer – and do it NOW


Re: Mitigation

Haven't looked into the details but presumably one would "exploit the exploit" with a specially crafted image containing some code.

If (huge if) this is already in the wild it's not impossible that it sends itself to contact lists etc so "trusted sources" (e.g. family/friends) becomes a meaningless term.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Biting the hand that feeds IT © 1998–2019