Impact: An attacker who is able to bypass Apple's certificate pinning,
intercept TLS connections, inject messages, and record encrypted attachment-
type messages may be able to read attachments
Description: A cryptographic issue was addressed by rejecting duplicate
messages on the client.
CVE-2016-1788 : Christina Garman, Matthew Green, Gabriel Kaptchuk, Ian Miers,
and Michael Rushanan of Johns Hopkins University CVE-2016-1752 : CESG
CVE-2016-1750 : CESG
I wonder if that's <https://www.cesg.gov.uk/>, which is "the Information Security Arm of GCHQ". If so I guess we should be thankful that they saw these vulnerabilities is a risk rather than an opportunity.Nice timing.
Probably pissed off a bunch of the intelligence community today.
Now, we've got languages like Rust that offer improved safety mechanisms without really sacrificing expressiveness or runtime performance the way "managed" languages do, so there's a real alternative for software that needs the highest performance or best battery life.
If you mean safe like there's no way a programer can screw this (100% memory managed like JavaScript, Python, Ruby) than I'd bet not.
Instead, I expect iOS 10 and the fall hardware announcements are where we'll start seeing signs of any really big changes, e.g. an Apple push to seal itself (and government actors) completely away from customer data access.