All Apple Products are Vulnerable to New Password Stealing Hack

แชร์
ฝัง
  • เผยแพร่เมื่อ 30 ก.ค. 2024
  • 👉 Free $100 Cloud Computing Credit
    seytonic.cc/linode
    0:00 iLeakage
    3:43 North Koreans Infiltrating US Companies
    5:54 Annoying New Flipper Zero Hack
    7:49 Google FAILS on Malvertising
    Sources:
    arstechnica.com/?p=1978389
    ileakage.com/
    www.bleepingcomputer.com/news...
    therecord.media/doj-seizure-w...
    www.justice.gov/opa/pr/justic...
    www.darkreading.com/careers-a...
    www.ic3.gov/Media/Y2023/PSA23...
    www.justice.gov/opa/pr/justic...
    techcrunch.com/2023/09/05/fli...
    techryptic.github.io/2023/09/...
    www.bleepingcomputer.com/news...
    / cyf5y2eta_v
    • Flipper Zero Apple iPh...
    lockup spam demo • Flipper Zero Apple iOS...
    www.mobile-hacker.com/2023/10...
    arstechnica.com/?p=1977141
    www.bleepingcomputer.com/news...
    www.malwarebytes.com/blog/thr...
    ===============================================
    My Website: www.seytonic.com/
    Follow me on TWTR: / seytonic
    Follow me on INSTA: / jhonti
    ===============================================
  • บันเทิง

ความคิดเห็น • 471

  • @collectorguy3919
    @collectorguy3919 8 หลายเดือนก่อน +110

    In 2023, advertisements are STILL a vector for malware. An ad-blocker is essential for security.

    • @Seytonic
      @Seytonic  8 หลายเดือนก่อน +16

      The FBI approves this message

    • @kenosabi
      @kenosabi 8 หลายเดือนก่อน

      Google knocking your door in ..in 5 ..4...3...
      GIVE US THE AD REVENUE

    • @UKsystems
      @UKsystems 4 หลายเดือนก่อน

      Reader has the one you use as some can contain malware

  • @benchy5769
    @benchy5769 9 หลายเดือนก่อน +87

    Google did things like this and they ask why people use ad blockers

  • @OcteractSG
    @OcteractSG 9 หลายเดือนก่อน +275

    It’s close to a full year since the first news broke about malware in Google ads, and it’s for Free software again! At what point do we call this lack of action to fix the problem malicious on its own? I think now is a good time.

    • @SpaceshipOperations
      @SpaceshipOperations 9 หลายเดือนก่อน

      >At what point do we call this lack of action to fix the problem malicious on its own
      It has been the case for decades. There are many verified leaked documents about how the NSA stalks, harasses and threatens software engineers (including, for example, those in committees responsible for shaping networking standards) in order to force them to make their software/standards vulnerable, so that governments can hack you whenever they want.

    • @notaplic8158
      @notaplic8158 8 หลายเดือนก่อน +18

      Malware ads have been around since pretty much the invention of Internet advertising

    • @smoothbraindetainer
      @smoothbraindetainer 8 หลายเดือนก่อน +8

      Frauds and scams are the bread and butter of advertising. Ad pay is directly correlated to gullibility. Why do you think "adult content" pays so much...

    • @c1ph3rpunk
      @c1ph3rpunk 8 หลายเดือนก่อน +1

      It’s been close to 2 decades since this concept has existed, deal with it.

    • @RadikAlice
      @RadikAlice 8 หลายเดือนก่อน +4

      Man, I feel bad for you. Pretty much all replies are missing your point or dismissing it outright

  • @velociraptor5962
    @velociraptor5962 9 หลายเดือนก่อน +560

    Great... Just after I get my first iPhone in 10 years. 😂

    • @pootispiker2866
      @pootispiker2866 9 หลายเดือนก่อน +78

      What happens on your iPhone, stays on my iPhone

    • @jimmypatton4982
      @jimmypatton4982 9 หลายเดือนก่อน +36

      Just don’t visit malicious websites and don’t hang out with prankers.
      Though I would give the same advice to android users, so nothing new just annoying.

    • @jhonwickmex
      @jhonwickmex 9 หลายเดือนก่อน +18

      Should have stayed with what you had

    • @ahmetsakin8573
      @ahmetsakin8573 9 หลายเดือนก่อน +35

      Why tf would you get an iPhone after 10 years

    • @_Neopolitan
      @_Neopolitan 9 หลายเดือนก่อน +29

      Your fault for going apple

  • @matteovalentino4890
    @matteovalentino4890 9 หลายเดือนก่อน +324

    To be fair, I read the paper, the practical application of such an exploit is incredibly difficult, it takes forever to steal strings, and it took years to a research team to obtain something, I'd say we good, majority of threat actors nowadays are kids that make DDos attacks or RaaS to make a quick buck

    • @inthefade
      @inthefade 8 หลายเดือนก่อน +60

      Even if it is incredibly difficult, that is barely a hindrance to state actors; They have the best talent and infinite resources.

    • @prcvl
      @prcvl 8 หลายเดือนก่อน +29

      perfect for country funded hacking teams

    • @varram3488
      @varram3488 8 หลายเดือนก่อน +2

      hahahhaha so true about the majority of the threat actors part

    • @MVPMTKING
      @MVPMTKING 8 หลายเดือนก่อน

      ​@@inthefadeno such resource on earth is infinite, water, time, food, electricity, people.
      But they do have a helluva lot in terms of CySec.

    • @matteovalentino4890
      @matteovalentino4890 8 หลายเดือนก่อน +24

      @@inthefade I mean on that level let's be honest, state level threat actors probably have a huge supply of zero days and surely they don't need a year old exploit, let's remember that counties are the main customers of the NSO group

  • @edsmith3052
    @edsmith3052 8 หลายเดือนก่อน +9

    Awesome video, I like that you’ve gone back to the multiple topic videos. It’s great to be able to watch one video and get an overview of important cybersecurity issues. As always, keep up the great work.

    • @Seytonic
      @Seytonic  8 หลายเดือนก่อน

      Thanks :)

  • @tech1238
    @tech1238 9 หลายเดือนก่อน +112

    Apple have been battered with CVE’s in the last 1-2 months. Time have changed

    • @jimmypatton4982
      @jimmypatton4982 9 หลายเดือนก่อน +34

      iOS is probably the most common operating system if you look at single code stack.
      Android while having more phones has more code stacks and hardware stacks, so exploits can be limited in scope.

    • @redbakery8943
      @redbakery8943 9 หลายเดือนก่อน +18

      That's nothing new, they have been for years now. Look at the iOS security patch notes.

    • @tech1238
      @tech1238 9 หลายเดือนก่อน +1

      @@redbakery8943 Whilst that is true, If you look specifically at macOS, there has been a large amount of patch releases for macOS Monterey and Ventura, plus the additional Safari patches.

    • @somnia3423
      @somnia3423 9 หลายเดือนก่อน

      @@jimmypatton4982yeah android phones are much safer

    • @camelotenglishtuition6394
      @camelotenglishtuition6394 9 หลายเดือนก่อน +2

      1-2 years

  • @klaudyw3
    @klaudyw3 9 หลายเดือนก่อน +75

    With regards to the keepass thing, the reason why that special K would get around that domain check might be quite simple - it boils down to how you deal with string comparisons. Different languages function differently, and I'm not going to pretend that i know what Google is doing, but here's what I think is going on. In a lot of cases you don't want to consider all the weird ways in which people might mess with text, so you get the option to ignore certain things when doing a string comparison.
    As a quick example, here's some Romanian letters: Aa Ăă Ââ. The first pair is just a normal A, but the other ones are slightly different. When you do a string comparison, you don't really want a strict comparison. Keyboards don't come with those letters out of the box, and most people will never even bother knowing how to type them (i copied them from Wikipedia). To deal with situations like this, you get a not so strict comparison going. In this case, my guess is that Google is using that not-so-string comparison when checking the domain name, leading to that issue.
    There's a lot of conference talks about text encoding, and they go into a bit of detail on how things work, how things are broken, and depending on what you look at how it can break things further. A lot of them are fun to watch, so if anyone's interested give it a search.

    • @SaHaRaSquad
      @SaHaRaSquad 9 หลายเดือนก่อน +8

      Not to mention there are many letters/symbols which even look exactly identical but are actually different. For example A and А are not the same letter: the second one is from the cyrillic alphabet and looks different in binary.

    • @ivanv754
      @ivanv754 9 หลายเดือนก่อน +4

      So it’s like the tilde in Spanish. It’s supposed to be there but people don’t type it a lot of the time. You don’t want to tell Simón that Simon is not his name.
      Simon will be the name in his ID in fact, but his school diploma will say Simón.

    • @mastermach50
      @mastermach50 9 หลายเดือนก่อน +5

      Like matching Pokémon and Pokemon for easier searchability?

    • @williamchamberlain2263
      @williamchamberlain2263 8 หลายเดือนก่อน

      Is this the unicode thing again? That the visible glyph isn't the same as the encoding

    • @gershommaes902
      @gershommaes902 8 หลายเดือนก่อน

      A nice word you might be looking for is "homoglyph"

  • @skywizard3319
    @skywizard3319 8 หลายเดือนก่อน +4

    finally... i really need these videos to be more frequent, even if you're covering dumb things

  • @NeuroNinjaX
    @NeuroNinjaX 8 หลายเดือนก่อน +2

    Let's wait until ChatGPT reads the paper... lol

    • @UKsystems
      @UKsystems 4 หลายเดือนก่อน

      It refuses harmful tasks

  • @Hasblock
    @Hasblock 9 หลายเดือนก่อน +2

    Amazing video as always, Mr. Hedgehog

  • @skkskk
    @skkskk 9 หลายเดือนก่อน +3

    Dude I love your video.its amazing

  • @shadyheadstash
    @shadyheadstash 9 หลายเดือนก่อน +16

    I spent all morning learning about WGPU and WASM and then immediately learn WASM is being used for hacking, because of course it is.

    • @Oliver_Atkinson
      @Oliver_Atkinson 8 หลายเดือนก่อน +9

      Tbf AFAIK all code gets used for hacking at some point

  • @luketurner314
    @luketurner314 8 หลายเดือนก่อน +1

    9:34 I find hilarious combined with TH-cam's war on Ad Blockers

  • @mythicXD
    @mythicXD 9 หลายเดือนก่อน +67

    I wonder if anyone with an amplified Bluetooth signal would sit near Apple HQ till they fix the bug?

    • @chri-k
      @chri-k 9 หลายเดือนก่อน +4

      it's not really fixable

    • @MelaninMagdalene
      @MelaninMagdalene 9 หลายเดือนก่อน +3

      @@chri-k
      What’s the reason for that?

    • @chri-k
      @chri-k 9 หลายเดือนก่อน +1

      @@MelaninMagdalene This exploit via WebKit may possibly be fixed, but the underlying bug is in the hardware.

    • @stayblueee
      @stayblueee 8 หลายเดือนก่อน +4

      @@SpookySkeleton738 the original comment was not about the speculative execution part of the video

    • @SpookySkeleton738
      @SpookySkeleton738 8 หลายเดือนก่อน

      @@stayblueee 💀

  • @coolhandle572
    @coolhandle572 9 หลายเดือนก่อน +7

    The media is already blowing this out of proportion. I am already imagining all of the tiktoks people will make.

  • @khoanguyen0001
    @khoanguyen0001 8 หลายเดือนก่อน +10

    Good news: Lockdown Mode can mitigated this kind of Safari attack. 🎉

  • @dil736
    @dil736 8 หลายเดือนก่อน +3

    Google owns TH-cam? TH-cam doesn't want me to use an ad blocker lol.

  • @twistedsaltypretzel7727
    @twistedsaltypretzel7727 9 หลายเดือนก่อน +37

    To be fair, a router with "Free Apple WiFi" would allegedly net a shitload of apple ID creds :/

  • @GrishTech
    @GrishTech 8 หลายเดือนก่อน +5

    Another good reason to never allow auto password fill by password manager s. On my ios device, I specifically have to press a login for it to be autofilled.

  • @auto117666
    @auto117666 9 หลายเดือนก่อน +5

    3:19 I can hear people in the reversing community say, “challenge accepted”

  • @FellowGEEK-mi4tw
    @FellowGEEK-mi4tw 8 หลายเดือนก่อน +2

    Looks like there is a fix inplace for iLeakage at least on my MacOS the feature flag for "Swap Processes on Cross-Site Window Open" was enabled for me. now checking if iOS Safari has this

    • @FellowGEEK-mi4tw
      @FellowGEEK-mi4tw 8 หลายเดือนก่อน +2

      Yep enabled in iOS too, so they fixed this when?

  • @bazzeil
    @bazzeil 8 หลายเดือนก่อน +2

    We tried the ddos bluetooth attach at work, it doesnt seem to work against samsung devices, and only the HP laptop in the office got the notifications. The Apple branded devices were hosed by this.

  • @brainstem2023
    @brainstem2023 9 หลายเดือนก่อน +10

    Duh, don't use a tab that YOU didn't open YOURSELF - either by using a saved bookmark or typing the URL. The only exception is if your browser is set up to open previously open tabs or certain tabs at startup. Popups are NEVER to be trusted unless it's spawned by the website you are using; for example, you click sign-in on your bank's page and a popup opens. That's pretty much internet safety 101. The weak link in internet security is almost ALWAYS the loose nut behind the keyboard.

    • @mgord9518
      @mgord9518 9 หลายเดือนก่อน +5

      The pop up is spawned by the website you're using... the attack looks exactly like OAuth, which is required to sign into tons of legitimate websites and your password is never supposed to be readable from it, which is the security vulnerability that's being talked about.

    • @SirFancy
      @SirFancy 9 หลายเดือนก่อน

      I cannot believe Apple is being defended already. It is not "internet safety 101" to not trust a website that has the green lock icon, is HTTPS, you've verified certs for, and has the correct URL. It is not uncommon for a site to open a popup to complete OAuth. This is Apple's fault, plain and simple. Under no circumstances should another tab have access to the contents of another when the site is completely different and not under their control. By design, this is supposed to be impossible with how the WWW operates, and it should be fixed by Apple, and not just be a "well now this is how it is so be more cafeful". If this is how it is now, then literally nothing can be trusted. So yeah. Apple needs to fix, end of story.
      Source: CASP+ certified

    • @DanielQwerty
      @DanielQwerty 9 หลายเดือนก่อน

      Ever used sign in with google?

    • @OGNord
      @OGNord 8 หลายเดือนก่อน +1

      @@DanielQwertynot even remotely the same thing

    • @samando524
      @samando524 8 หลายเดือนก่อน +2

      @@OGNord To the average person who has no idea about internet security it would sure seem like it.

  • @dsfs17987
    @dsfs17987 8 หลายเดือนก่อน

    Cyrillic lettering on the flipper case, why am I not surprised... 😂

  • @n-i-n-o
    @n-i-n-o 8 หลายเดือนก่อน

    love yor channel.

  • @cwaldrip
    @cwaldrip 8 หลายเดือนก่อน +3

    It's been a year without a patch, doesn't mean Apple isn't working on a fix. As pointed out it's a CPU issue so they're probably working on a balanced solution that doesn't completely eliminate the benefits of speculative execution but still try and mitigate the exploit. 🤔

  • @mo4503
    @mo4503 8 หลายเดือนก่อน +2

    This hack is not new. This has been around since 2017 or 2018. It was found on Intel CPU’s. It is the same method though. The CPU does what it think you’re about to do before you do it by your habits. It memorizes your habits over time and try’s to save small amounts of time for you.

  • @CZghost
    @CZghost 8 หลายเดือนก่อน +8

    Speaking of "understanding research papers" - most people will simply discard it as too long to read. But don't underestimate those who are determined. Determination is a powerful drive, and while it may take a longer time (a bit risky as it may be patched during this time), somebody might as well be able to piece it all together and start exploiting it.

    • @schwingedeshaehers
      @schwingedeshaehers 8 หลายเดือนก่อน

      It looks like Apple doesn't want to fix it.

  • @redslashed
    @redslashed 8 หลายเดือนก่อน

    Yo I spotted the flipper zero thing in the wild😂

  • @officialunderfire
    @officialunderfire 8 หลายเดือนก่อน

    Wow. Never thought I’d be effected by malware but yup... I fell for it. 😢

  • @huddunlap3999
    @huddunlap3999 8 หลายเดือนก่อน

    This is why I subscribe.

  • @btarg1
    @btarg1 8 หลายเดือนก่อน +1

    That annoying flipper zero packet looks like it would be hilarious to use against people in public

  • @free4fire
    @free4fire 9 หลายเดือนก่อน +8

    Bu...but Apple products can't be hacked or get viruses, the cool hip guy in the commercial said so, only those PC nerds can get those! XD

  • @QuantariousBitsoniTalvanen
    @QuantariousBitsoniTalvanen 8 หลายเดือนก่อน +1

    Finally, I can tell everyone who swears by the security of apple's products that they can suck it. At least till they find a patch.

  • @microdickie
    @microdickie 8 หลายเดือนก่อน +1

    This sounds similar to the Intel skylake flaws where threats could only be largely mitigated with a hefty performance penalty. This should be fun to watch play out.

  • @AWriterWandering
    @AWriterWandering 9 หลายเดือนก่อน +5

    This is why we can’t have nice things

  • @johanlugthart7782
    @johanlugthart7782 9 หลายเดือนก่อน +4

    Looks like I am save with my iPhone 8.😅

  • @Biggerman159
    @Biggerman159 9 หลายเดือนก่อน +2

    YESSS THE WEEK WEB IS BACK

  • @ardwetha
    @ardwetha 8 หลายเดือนก่อน +1

    Why does this exploit with apple kinda sounds like specter. Both exploit the specular execution and then read data from memory, even though the languages normally don't have features for this.

  • @bsdims
    @bsdims 8 หลายเดือนก่อน +2

    Shoutouts to cars where their stereo/speaker system only accepts Bluetooth pairing, no headphone cable for you, pisses me off. I can't wait for modern-day manufacturers to regret that choice due to Flipper0 nonsense & general security holes. Never liked Bluetooth, both as a consumer (pairing annoyances, battery-life to deal with, etc.) & as a security-minded fella. The only way you can disrupt wires is by wear & tear, and/or the chord being cut in two. AUX4Life, & oh yeah, same goes for modern smartphones too, courage my ass.

  • @Krzys_D
    @Krzys_D 8 หลายเดือนก่อน +1

    My work only uses Apple cause the owner and IT guy says that Apple has no vulnerabilities 😅 glad I'm the only one on PC

  • @imbrettk
    @imbrettk 9 หลายเดือนก่อน

    Oh no

  • @programateiro9507
    @programateiro9507 8 หลายเดือนก่อน +2

    1:23 - I didn't knew `speculative execution` was a thing and CPUs jumped into the if statement just to later evaluate it's value: this is massive security issue imho

    • @Aizemiyo
      @Aizemiyo 8 หลายเดือนก่อน +1

      Just another name for prefetching, it is originally employed to improve cpu performance, security wasnt really a big thing back then.

  • @atirutwattanamongkol8806
    @atirutwattanamongkol8806 9 หลายเดือนก่อน +21

    How on Earth can JS access something that low-level?????

    • @LetrixAR
      @LetrixAR 9 หลายเดือนก่อน +6

      It doesn't. WASM was used.

    • @atirutwattanamongkol8806
      @atirutwattanamongkol8806 9 หลายเดือนก่อน +3

      @@LetrixAR WASM is a simulated stack machine in a nutshell, so there should still be no way for it to access something so low-level.

    • @GizziXZ
      @GizziXZ 9 หลายเดือนก่อน

      ​@@atirutwattanamongkol8806What's WASM?

    • @TMinusRecords
      @TMinusRecords 8 หลายเดือนก่อน

      It's a timing based attack

    • @samando524
      @samando524 8 หลายเดือนก่อน

      @@atirutwattanamongkol8806 If you watch the video it includes an explanation. Hope this helps :)

  • @ifur
    @ifur 9 หลายเดือนก่อน +6

    Bye bye iCloud Keychain?

    • @jimmypatton4982
      @jimmypatton4982 9 หลายเดือนก่อน

      It doesn’t matter if keychain or manually typing. As far as I could tell they are putting in long to execute statement to have as much data pre-gussed generated. Grabbing the data and then repeating if possible or just giving up.
      I think what matters is adding code to prevent the exploit from leaking one source of data to previous site.

  • @UnderSquare
    @UnderSquare 8 หลายเดือนก่อน

    He had his coffee right before recording "Hello World"

  • @reoccurcat
    @reoccurcat 8 หลายเดือนก่อน +1

    Someone literally used that Bluetooth attack on me today and crashed my phone too

  • @kumalalalalalalaa7045
    @kumalalalalalalaa7045 8 หลายเดือนก่อน

    Thanks im gonna use this lol

  • @H0mework
    @H0mework 9 หลายเดือนก่อน +3

    I remember the spectre and meltdown Intel 'bug'. I disabled the patch and my computer felt like I upgraded.

    • @mollthecoder
      @mollthecoder 8 หลายเดือนก่อน +3

      And now a script kiddie can have full access to your computer memory

    • @fordprefect859
      @fordprefect859 8 หลายเดือนก่อน +1

      that is a bad idea. Modern CPUs are actually optimized to run those patches, and the security implications of turning them off are.... apocalyptic.

    • @tezcanaslan2877
      @tezcanaslan2877 8 หลายเดือนก่อน

      I would only recommend doing this in aging systems with no critical data as you have just left your probably critical computer open to pretty much all remote attacks
      Turn that on or refrain from angering anybody on the internet.

    • @TheOfficialOriginalChad
      @TheOfficialOriginalChad 8 หลายเดือนก่อน

      @@mollthecoderyou clearly haven’t read the PoCs for them 😂

    • @mollthecoder
      @mollthecoder 8 หลายเดือนก่อน

      @@TheOfficialOriginalChad I have, what are you referring to in particular?

  • @asdprogram
    @asdprogram 9 หลายเดือนก่อน +15

    intel used to struggle with the same vulnerability, but they appearantly fixed it and it appearantly doesnt really cost measurable cpu performance. I tested it

    • @aronm5329
      @aronm5329 9 หลายเดือนก่อน +9

      New cpu are built against meltdown so it's not an issue anymore. The update windows did in 2018 did lower CPUs vulnerable performance by a measurable amount however. Most people might not tell, but it wasn't insignificant

    • @asdprogram
      @asdprogram 9 หลายเดือนก่อน +1

      @@aronm5329 I haven't seen any performance difference with my haswell cpu with or without spectre and meltdown mitigation.

  • @justinolsen488
    @justinolsen488 8 หลายเดือนก่อน

    9:12 Microsoft edge also has that!

  • @mylesisshort
    @mylesisshort 8 หลายเดือนก่อน

    the flipper zero thing sends a packet that is the same as the apple tv packet with the last few characters randomized

  • @julvialinares1395
    @julvialinares1395 8 หลายเดือนก่อน

    Is the ileakage only works for Apple or third party password managers. Since they didn’t mention passkeys. Reply if it also works for passkeys. Because this is new to me.

    • @sarae9302
      @sarae9302 8 หลายเดือนก่อน

      iLeakage allows you to access any data that's present on the page you opened. Passkeys are not susceptible to being stolen this way because the website first needs to send you an authentication request and your browser responds to that requests. The response, even if intercepted, can't be replayed in the future. However, any resulting authentication tokens (bearer tokens, cookies, etc) can be stolen which could grant the attacker access to your account.

  • @Andreasepicgamingr
    @Andreasepicgamingr 8 หลายเดือนก่อน +1

    Wait so intel based macs are safe?

  • @IDontModWTFz
    @IDontModWTFz 9 หลายเดือนก่อน +1

    How unfortunate

    • @LeonSteelpaw
      @LeonSteelpaw 9 หลายเดือนก่อน

      Uh-oh!
      How Unfortunate!
      I'm going to do a sneaky thing, and throw a new contender into the ring!
      *A New Challenger Has Appeared!*

  • @MorningStarChrist
    @MorningStarChrist 8 หลายเดือนก่อน +1

    I find it baffling that apple has its own specter vulnerability.

  • @InsideOfMyOwnMind
    @InsideOfMyOwnMind 8 หลายเดือนก่อน

    Interesting that the FBI recommends using an ad blocker while youtube is at all out war with ad blockers.

  • @tsukipuppy
    @tsukipuppy 8 หลายเดือนก่อน

    I recently purchased a MacBook then saw this video 😂

  • @aussiemadlad
    @aussiemadlad 9 หลายเดือนก่อน +2

    DAMN. i gotta warn my mum

    • @feuerherz007
      @feuerherz007 9 หลายเดือนก่อน +3

      don't worry, i told her already

  • @prophoenix212
    @prophoenix212 9 หลายเดือนก่อน +12

    Isnt it similar to spectre attack on intel cpus?
    Also for android fans, you can steal data much easier from android and you don’t need those exploits.. 2:05

    • @lbgstzockt8493
      @lbgstzockt8493 9 หลายเดือนก่อน

      Sure sounds like it, which is probably why there is no fix for it yet. Didn’t the spectre fix cause a performance drop in some cases?

    • @dealloc
      @dealloc 9 หลายเดือนก่อน +5

      Yes. In fact I think it would fall under Spectre (also noted by the iLeakage paper) which affected all major CPUs; Intel, AMD and ARM.
      However, it also seems Safari is a big piece in this in how it apparently shares some memory between tabs when it shouldn't-both Chrome and Safari employs tab isolation, where each tab is assigned its own process-but it seems Safari may still leak some memory, or it could be the OS as well, given that processes should never be able to share resources as they should be in their own memory space.

    • @mgord9518
      @mgord9518 9 หลายเดือนก่อน +1

      If it's so easy then how do you do it?

    • @LetrixAR
      @LetrixAR 9 หลายเดือนก่อน +1

      ​@dealloc but this seems to be tied to webkit. How does a rendering technology affects a policy of tab isolation?

    • @dealloc
      @dealloc 8 หลายเดือนก่อน

      ​@@LetrixAR
      Was it exploited on other WebKit-based browsers that didn't use tab isolation? So far I've only seen reports on Safari specifically (on macOS).
      On iOS you can't use WebKit directly,. You use a wrapper API like UIWebView (or rather, the newer WKWebView).
      It's also not possible for browsers on iOS to spin up additional processes So these restrictions could make it possible for browsers on iOS to be affected by this too due to these limitations.

  • @alejandroalzatesanchez
    @alejandroalzatesanchez 9 หลายเดือนก่อน +1

    kinda ironic that the example password is: thinkdifferent

  • @Sound_.-Safari
    @Sound_.-Safari 8 หลายเดือนก่อน +2

    Pegasus like 🤤

  • @aliabdallah102
    @aliabdallah102 8 หลายเดือนก่อน +1

    Didn't intel have to deal w this stuff back i 15?

  • @Nas_Allie
    @Nas_Allie 8 หลายเดือนก่อน

    Ironic, cannot even open TH-cam with ad blocker installed but ads turn on

  • @ong1
    @ong1 8 หลายเดือนก่อน +1

    0:13 I misheard Malaysia's😅

  • @iamagi
    @iamagi 8 หลายเดือนก่อน +1

    The need to reverse the decision to allow other characters than a-z

  • @rimilien
    @rimilien 8 หลายเดือนก่อน

    So the exploit relies on java?

  • @letsmakethis
    @letsmakethis 9 หลายเดือนก่อน +7

    I'll wait to see what the Security Now guy has to say about this on Tuesday before I get too concerned. There have been a stream of "sky is falling" stories about Apple vulnerabilities lately, but when you get a report from someone who actually read and understands what the researchers found, you typically find that you have to be a target of a nation state to worry about it and/or it's easily blocked.
    This would also be the first time in 6 years that a Spectre/Meltdown-type of vulnerability had an impact on anything other than a web server.

  • @maka6000
    @maka6000 9 หลายเดือนก่อน

    So, a workaround is to use Firefox?

    • @LetrixAR
      @LetrixAR 9 หลายเดือนก่อน

      No Safari on macOS and no browser in iOS.

  • @ghost_ship_supreme
    @ghost_ship_supreme 8 หลายเดือนก่อน

    Great… so it’s just a matter of time

  • @janmillerty4528
    @janmillerty4528 9 หลายเดือนก่อน

    Cool

  • @bestaimy
    @bestaimy 9 หลายเดือนก่อน +1

    wow

  • @Australia_QLD
    @Australia_QLD 9 หลายเดือนก่อน

    so just turn off auto fill and watch for redirects?...

    • @SaHaRaSquad
      @SaHaRaSquad 9 หลายเดือนก่อน +2

      Or just don't use Safari

  • @anon_y_mousse
    @anon_y_mousse 8 หลายเดือนก่อน

    The broken URL garbage situation is why only ASCII text should be allowed in URL's and it should be stringently checked by *everyone*, especially the browser. It's not that hard to run through a 64k character string once to check that each character falls within a given range by simply using a table based approach. You can do direct calculation on the accepted range and use SIMD to parallelize it if you really feel it's necessary even though it'll only be checked when changing addresses. Oh well, I'm still hoping that HTML/CSS/JS get erased and replaced.

    • @stevebabiak6997
      @stevebabiak6997 8 หลายเดือนก่อน +1

      This is tricky, but it looked like the actual URL was all ASCII, but the address bar interpreted the Unicode characters and displayed those characters rather than the straight ASCII. The browsers should stop doing that with any URL and problem would be gone.

    • @anon_y_mousse
      @anon_y_mousse 8 หลายเดือนก่อน

      @@stevebabiak6997 Do you know what ASCII is? The character in question which was shown in the video was ķ. It's described as "Latin small letter K with cedilla" with the code U+0137, UTF-8 0xC4 0xB7. That is most decidedly outside the range of ASCII characters.

  • @rafaelestevam
    @rafaelestevam 9 หลายเดือนก่อน

    8:30 Ohhhh I rub the screen 😅

  • @christopherg2347
    @christopherg2347 8 หลายเดือนก่อน

    Speculative execution is starting to be a seriously challenger to buffer over- and underflows as "the most common security vulnerability".

  • @WiluckGD
    @WiluckGD 9 หลายเดือนก่อน +1

    Ok I’m screwed then

  • @realgalactic
    @realgalactic 9 หลายเดือนก่อน +1

    Hi!

  • @AlanTheBeast100
    @AlanTheBeast100 8 หลายเดือนก่อน

    A graduate of Clickbait Academy.

  • @Irwin.009
    @Irwin.009 8 หลายเดือนก่อน

    Bowser is taking over

  • @artbanks27
    @artbanks27 8 หลายเดือนก่อน

    Neat

  • @Abdullah97484
    @Abdullah97484 9 หลายเดือนก่อน

    Gheez that sussy K

  • @sockraltiltemper5402
    @sockraltiltemper5402 8 หลายเดือนก่อน

    I leakage lol that's great

  • @SASTSimon
    @SASTSimon 8 หลายเดือนก่อน

    Uh oh

  • @hung8969
    @hung8969 9 หลายเดือนก่อน +5

    Any way you can do a video on TH-cam/Google stimulus scam ads. I get 5-10 a day, using a Ai celebrity voice and stolen footage from random other things to create an ad about getting a stimulus or free healthcare card. They keep getting worse and worse, my grandfather didn’t know they were fake for months till I told him about it. He signed up multiple times, I had to spend a few days checking all of his stuff and changing his information

    • @Sashazur
      @Sashazur 8 หลายเดือนก่อน

      All the ads I see on TH-cam and Instagram are sleazy.

  • @kitterbug
    @kitterbug 9 หลายเดือนก่อน

    droid gang how you feeling

  • @FusionDeveloper
    @FusionDeveloper 8 หลายเดือนก่อน

    Ad blockers, aka, scam blockers.

  • @PartlyXenon
    @PartlyXenon 9 หลายเดือนก่อน +1

    I guess I'm never getting berated again for disabling JavaScript..

  • @matthewrease2376
    @matthewrease2376 9 หลายเดือนก่อน +2

    7:24 I think I could stop this attack if it happened to me. I can just hold my power button (activates bixby) and say "turn off Bluetooth". Just tested and it turned off pretty fast.

  • @robeagleR
    @robeagleR 9 หลายเดือนก่อน +1

    Okay so I’ll just blacklist it from my router. 🎉

  • @trthambi1857
    @trthambi1857 8 หลายเดือนก่อน +1

    ... The percentage of people that can understand the hack, is very small. The actual number of people is in the tens of thousands if not more. So it is likely this hack is being exploited in the wild. Just not on a scale that is a threat to the average person.

  • @MelaninMagdalene
    @MelaninMagdalene 9 หลายเดือนก่อน

    North Korea really pulled itself up by the bootstraps

  • @kenosabi
    @kenosabi 8 หลายเดือนก่อน

    If all the NK money is sent back for missiles...shouldn't they have a way larger arms program by now..?

  • @BPTtech
    @BPTtech 9 หลายเดือนก่อน +1

    Linode got bought by Akamai?

    • @Get_yotted
      @Get_yotted 9 หลายเดือนก่อน +1

      You didn’t know, it’s been a while already

  • @warehousing2953
    @warehousing2953 8 หลายเดือนก่อน

    Speculative execution introduced in 1:40 is bat shxt crazy and shocking! Who invented this crap? A backdoor for govt?

  • @Jaxx7594
    @Jaxx7594 8 หลายเดือนก่อน +1

    Techryptic isn't the guy who found the bluetooth DoS. He stole the work of the Flipper Zero Xtreme dev team. Please, credit the right people. If you wan't, I could link you a blog post from the Xtreme team proving it all

  • @1.4142
    @1.4142 8 หลายเดือนก่อน

    FBI recommending adblock? take that youtube.

  • @xproot0
    @xproot0 9 หลายเดือนก่อน +1

    Spectre for Apple wtf

  • @iblackfeathers
    @iblackfeathers 9 หลายเดือนก่อน +1

    i find it strange you're crediting techryptic not furiousmac, salmq, ecto-1a, willyjl et al?