1970-01-01 3 days ago

They do have ways to access to them, which is the same thing in my book.

https://www.bleepingcomputer.com/forums/t/809154/apple-silen...

  • closeparen 3 days ago

    I don't think this shows that at all?

    • 1970-01-01 3 days ago

      How else can you patch an exploit if you don't try it first? The first step in reverse engineering malware is to try the exploit in a controlled environment.