hackitfast, 9 months ago I think the implication is zero-click exploit. But if that’s the case it should be fairly simple to reverse engineer whichever exploit they’re using.
I think the implication is zero-click exploit.
But if that’s the case it should be fairly simple to reverse engineer whichever exploit they’re using.