![]() To demonstrate the risks that come with this move, Wardle-a former hacker for the NSA-demonstrated how malware developers could exploit the change to make an end-run around a tried-and-true security measure. Q: Could this be (ab)used by malware to also bypass such firewalls? □Ī: Apparently yes, and trivially so □□□ /CCNcnGPFIB- patrick wardle Novem“100% blind” ![]() In Big Sur Apple decided to exempt many of its apps from being routed thru the frameworks they now require 3rd-party firewalls to use (LuLu, Little Snitch, etc.) □
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |