In other words, no random website could typically gain access to the iPhone cameras, unless it was explicitly trusted and allowed by a user. The vulnerability existed in the Safari and Webkit browser codes in iOS, which enabled attackers to bypass iOS' generally tight restrictions for access of camera by third party processes.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |