* Posts by jason_uk

1 post • joined 28 Jul 2015

Got an Android phone? SMASH IT with a hammer – and do it NOW


Re: Mitigation

Haven't looked into the details but presumably one would "exploit the exploit" with a specially crafted image containing some code.

If (huge if) this is already in the wild it's not impossible that it sends itself to contact lists etc so "trusted sources" (e.g. family/friends) becomes a meaningless term.

Biting the hand that feeds IT © 1998–2019