top | item 21100246

(no title)

j_jochem | 6 years ago

> * Checkm8 doesn't bypass the protections offered by the Secure Enclave and Touch ID. All of the above means people will be able to use Checkm8 to install malware only under very limited circumstances.

> * The above also means that Checkm8 is unlikely to make it easier for people who find, steal or confiscate a vulnerable iPhone, but don't have the unlock PIN, to access the data stored on it.

Apparently, this is not the same exploit.

discuss

order

No comments yet.