Discover and read the best of Twitter Threads about #FreeTheSandbox

Most recents (7)

As part of preparing a burner for BH & DC, I chose a device that has inferior HW security (e.g. A<12) to be able to dump the FS after.

It was either that, or remaining on an outdated OS.

It is ridiculous that we need to compromise on security to get (some) visibility 😀
#FreeTheSandbox βœŒοΈπŸ‘Š
Dear Friendly Threat Actors, Yes, it means that I'm accepting 0day submissions (/attacks) in the upcoming DEFCON too.

Send it my way please.

πŸ™ Mahalo in advance <3
Read 3 tweets
For those who think that NSO is the problem - you're missing out the bigger picture:

1. There are many vendors like NSO, not just in Israel. Also in EU, APAC, N. America, and others.

2. Even if NSO shuts down tomorrow: we still have a problem: mobile attacks are scalable.
2. (cont) Once you have created a generic attack-chain, you can infect 1B+ devices. This is too powerful to keep a single barrier for attackers which already block telemetry sharing with the vendors.
3. NSO is *EASY* to find *if* a deeper access is provided to the phones.

Which leads to the bigger problem:

Why we can opt-in to be tracked by ads but can't opt-in to choose our own security apps to run with full privileges on our own phones?
Read 5 tweets
[Important thread 1/N]: Let that sink in for a second: almost all respected publications were under espionage.

All the sources of journalists, were exposed. If you ever spoke to a journalist (even with "Signal"/"Whatsapp") you are exposed.

THIS IS A MAJOR THREAT TO DEMOCRACY!
[2/N] If we needed another proof that we have to fix the broken mobile security permission model, here it is.

NSO's software is actually super easy to catch, but due to the lack of permissions it becomes almost impossible at scale, and NSO only has a single vendor to avoid.
[3/N] This was easy to do for NSO: they simply blocked telemetry, communications, and updates to Apple/Google: and viola! They were set. The vendors had no visibility.
Read 8 tweets
The author of this post found the SolarWinds attack a 2-3 months before FireEye's announcement on December 8th 🀯reddit.com/r/Solarwinds/c… Image
The SolarWinds attackers used a system path to plant the malware in stage 2 (e.g. C:\Windows).

On smartphones we wouldn't be able to legitimately discover such attack due to sandbox restrictions on system folders πŸ€¦β€β™‚οΈπŸ€―

I'll wrap up with the obligatory #FreeTheSandbox πŸ‘Š Image
Original file "GetUpdateDates.vbs" does not have a ".cmd". Anyone happen to have a copy of the ".vbs.cmd" file? It's not 100% yet that it was related to the attack, another actor, or a file used by SW engineer that loves double extensions but it will be great to find out 🧐
Read 3 tweets
iOS 14.5 came out with this option πŸ‘‡

*seven* actively exploited zero-days were discovered in iOS in 2021 but we do not have "Allow Apps to access entire filesystem & memory" option. Priorities.

Tell me more about how privacy is a fundamental human right.

#FreeTheSandbox now! Image
2 0days just patched... so if you're using iOS it's worth to update to the latest version.

Of course this is only the browser vulnerabilities: it does not fix additional kernel bugs that were most likely chained to these: arstechnica.com/gadgets/2021/0…
Read 3 tweets
Xcode Developer Disk Image has hidden features that allow directory listing (unfortunately CAN'T read any file) and process termination w/o jailbreak. Here's what it looks like on my iPhone XS running iOS 13.4 Beta: ImageImage
When #FreeTheSandbox hasn't come, this toy can help you find suspicious processes (e.g path starts with /tmp) if they don't hide their asses like Windows rootkits lol. Source Repo: github.com/ChiChou/FreeTh…

Requires DDI on iPhone and Xcode on macOS.
@objective_see take a look at this shit lol. Respring w/o jailbreak
Read 3 tweets
After the release of Checkm8, hundreds (maybe thousands) of researchers globally didn't sleep much and basically looked like this. Getting into DFU hundreds of times is quite tiring but soon the sandbox will be forever free for most iPhones/iPads!
#FreeTheSandbox #Checkm8
Shamelessly copied from @AntonSquaredMe who did it for chess (but not Checkm8) :)
While we're at it, like/RT this tweet to help @Apple understand that #FreeTheSandbox would actually help iOS security:
Read 3 tweets

Related hashtags

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!