Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I think this is important research if only for the fact that it illuminates the states of CPU as they apply to threat models for users. It wasnt too long ago that many state sponsored Android hacks were revealed to work due to 2 separate unlock states in the system, and so long as an initial unlock had been performed, most of the phone could be hacked through services that were running in the background on the network.


Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: