w3irdrobot on Nostr: this seems overly complicated to me. it all starts with getting a malicious app on ...
this seems overly complicated to me. it all starts with getting a malicious app on the users phone. if you can get the app there, why use such a complicated attack when a root kit would do alot more for you?
it's a great write up on how caching can be used maliciously but the demonstrated usage seems like the wrong way to use it
Published at
2025-01-21 20:45:45Event JSON
{
"id": "257c40a33d89e30b629c565258372f1cb9171efdcee4dce208c9cfd54aee6534",
"pubkey": "f0293508f3eb9e6fe99c2fd8ba69ff446216872a2d9f67979bfa4db8b3155806",
"created_at": 1737492345,
"kind": 1,
"tags": [
[
"e",
"5921f361d43429be5b774f4e82a420d53268388825259cb3d13019c54ec592ae",
"",
"root"
],
[
"p",
"e88a691e98d9987c964521dff60025f60700378a4879180dcbbb4a5027850411"
]
],
"content": "this seems overly complicated to me. it all starts with getting a malicious app on the users phone. if you can get the app there, why use such a complicated attack when a root kit would do alot more for you? \n\nit's a great write up on how caching can be used maliciously but the demonstrated usage seems like the wrong way to use it",
"sig": "3ee788fa9f26efdaa9f32bec56c50f2d7819a22b73e903ca52ae306f45de23ec61ecc0dd591d4aa0b24b187bb181cf48f4d3804e85e47593497440fb11c4e4a5"
}