• 0 Posts
  • 3 Comments
Joined 2 years ago
cake
Cake day: July 6th, 2023

help-circle
  • BugKilla@lemmy.worldtomemes@lemmy.worldLol🥴
    link
    fedilink
    arrow-up
    0
    ·
    2 hours ago

    If the internet has taught me something it is: there is market for ANYTHING.

    There would be a group of people out there thirsty AF for pics of you in either garment, no garments, a sailor uniform, dinosaur suit or a man-kini. You would be loved and worshipped by people you wouldn’t even had guessed would be into you.

    Just don’t post it here please.


  • Well, yes. You could bury code or malicious data in an image, QR or otherwise, and leverage an exploit that during processing of the visual data within the camera subsystem or inter subsystem calls could hypothetically trigger an execution path that results in a different outcome than expected, all without user permission. There is a lot of sw and hw sec controls in play at internal system boundaries and it would be very very difficult to gain privilege enough to fist fuck a phone but not impossible.

    With the outstanding level of FR, NFR and Sec testing that companies perform these days it is not likely to happen. It’s not like they push out minimal viable products or something, right? /S