Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Reporting and investigation matters. Perhaps the initial report was only on the bypass of the lock-screen but the initial report only ran into the decrypted phone state so it was dismissed as not being exploitable (see other comments), whilst the second report actually got inside an active phone (And then was also written up in a simple, concise and reproducible way).


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: