

5·
29 days agoI don’t know why there’s a need to use outdated symbols here.
You may be able to find me on other platforms by the same name!
Mastodon: specialwall@woof.tech
Contact me on SimpleX or Signal!


I don’t know why there’s a need to use outdated symbols here.


The malicious apps introduce the main payload via an update request and then ask for Device Admin and Accessibility Services permissions, which let it to perform fraudulent activities.
So to get compromised, you have to give an untrusted app full control of your computer? For a moment, I thought another actual permissionless vulnerability might have been discovered, but it seems not.


An AI-generated thumbnail isn’t a great sign for a cybersecurity related article. 😕
What specifically do you dislike about zsh?