Hello thanks for visiting my profile.

For any picture posts I make with the [OC] tag, I provide a license for you to use my photo under the terms of CC-BY-SA-4.0. You may DM me for questions.

  • 1 Post
  • 13 Comments
Joined 2 years ago
cake
Cake day: March 14th, 2023

help-circle





  • Rentlar@lemmy.catoAsklemmy@lemmy.ml*Permanently Deleted*
    link
    fedilink
    arrow-up
    23
    ·
    edit-2
    1 year ago

    They are equally exploitable, but those exploits are generally easier to find and fix on open source software than closed.

    As an example, look at the exploit chain Apple had only patched recently, “TriangleDB”. The exploit relied on several security flaws and undocumented functions, and it was used extensively in state-sponsored malware such as Pegasus for years. If any part of the exploit chain were patched, the malware wouldn’t have worked. It took a Russian cybersecurity firm a significant effort to track down how the exploit worked when they found out they were being targeted by the malware.