It reminds you of those because they’re all “exploits”, but what’s needed to implement this, introduces several other levels of additional steps which means it’s highly unlikely for this to be put into action."we do not believe this issue poses an immediate risk to our users." That may have been true but now that it was published in the two papers that Bleeping links to I would suspect that would change. Apple should have patched these. Reminds me of Meltdown and Spectre.
And, most importantly for malicious actors, they’re not looking for the way to exploit users that most impresses security researchers. If there’s an easier, or more importantly quicker way (less than the 5-10 minutes required) to exploit someone, they’re going to use that, which would also decrease the likelihood of this being used in the wild.
Last edited: