Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I think it qualifies as a great exploit. You totally go around the Private API checks that Apple does. And there is a lot you can do with those APIs that is potentially evil. Even in the sandbox.


It's trivial to bypass those checks anyway.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: