![]() ![]() If you haven't read it already, please do!įirst of all, I'd like to point out that I've responsibly disclosed this vulnerability to Qualcomm, and the issue has already been fixed (see "Timeline" below). In this blog post, we'll cover the complete process of exploiting the TrustZone vulnerability described in the previous post.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |