Skip to content
Better HN
Top
New
Best
Ask
Show
Jobs
Search
⌘K
undefined | Better HN
0 points
1970-01-01
3mo ago
0 comments
Share
They do have ways to access to them, which is the same thing in my book.
https://www.bleepingcomputer.com/forums/t/809154/apple-silen...
0 comments
default
newest
oldest
closeparen
3mo ago
I don't think this shows that at all?
1970-01-01
OP
3mo ago
How else can you patch an exploit if you don't try it first? The first step in reverse engineering malware is to try the exploit in a controlled environment.
j
/
k
navigate · click thread line to collapse