top | item 41264356

(no title)

homero | 1 year ago

So what? There's people who need remote support

discuss

order

croes|1 year ago

This what

>According to iVerify, once activated, the application downloads a configuration file via an insecure connection, which can result in system-level code being executed. The configuration file is retrieved from a domain hosted by AWS over unsecured HTTP, which leaves the configuration and the device vulnerable to malicious code, spyware and data wiping.

homero|1 year ago

HTTP means nothing