Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Or they just don't know. Full analysis of an exploit usually takes days to weeks. It's possible it's only exploitable on x86, but equally possible that only the x86 version of the payload was discovered in the wild.


Rosetta2 runs an x86 exploit? Doesn’t explain iOS but still sounds interesting!




Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: