In this video he discusses the TriangleDB attack chain that allowed hackers to completely compromise iPhones starting with a zero click exploit and ending with a bypass of Apples hardware based memory protection.
Read more about it from Kaspersky: https://securelist.com/triangledb-triangulation-implant/110050/
Thank you for the video summary. That’s very helpful
A… They found A iphone backdoor. There are others as surely as there are faults with all complicated systems.
you’re talking about bugs, not backdoors. A backdoor is something intentional
The distinction between an accidental bug, and the deliberate back door with plausible deniability is minuscule.
Unless you find the smoking gun document stating the reason for the code being written this way, there’s always going to be deniability, it’s always going to be pointed out as a bug.
But I think it’s immaterial, even if every back door starts off as a genuine bug, code is so large and complex that there’s going to be back doors to be harvested. And cataloged. And kept in reserve for advanced persistent threat actors
For those wondering: multiple security flaws that this actively exploited were fixed in iOS 16.5.1 and 17.